fbpx
  • LinkedIn
  • 514 879-5606
  • The bloG
  • Careers
  • The Firm
  • Contact
  • Français
Gascon ≡ Menu
  • FIELDS OF EXPERTISE
    • REAL ESTATE LAW
      • Real Estate Acquisition and Sale
      • Commercial Lease
      • Construction
      • Co-Owner
      • Title Review
      • Real Estate Finance
      • Contractors license
      • Due Diligence
      • REAL ESTATE SHAREHOLDING AND PARTNERSHIPS
    • BUSINESS LAW
      • Shareholding and Partnerships
      • Incorporation and Dissolution of Corporations
      • Agreements, Contracts and Partnerships
      • Corporate Financings
      • Merger and Acquisition
      • Corporate Governance
      • Corporate Reorganization
    • LITIGATION AND INSURANCE
      • Collection
      • Arbitration and Mediation
      • Bankruptcy, Insolvency and Restructuring
      • Construction Litigation
      • Commercial Lease Litigation
      • Conflicts between Shareholders
      • Insurance
      • Recourse in Co-ownership
      • Civil Liability Remedies, Hidden Defects and Insurance Recourse
      • Hypothecary Recourse
      • Appeal and judicial review
    • INTELLECTUAL PROPERTY / IT
      • Trademarks
      • Confidentiality Agreements
      • Service Agreements
      • Master Services Agreement (MSA) and Irrevocable Right of Use (IRU)
      • Easements for Telecommunication Services
      • Data Center Agreements
      • Software Source Code Escrow Agreements
      • License Agreements
      • Terms of Use of a Website
    • CYBERSECURITY
      • Incident response planning
      • Breach coaching
      • Loss and liability mitigation
      • Who is at risk?
    • DATA CENTERS
      • Land acquisition and planning
      • Construction and development
      • Operations
  • The Team
  • STARTUP G PROGRAM
  • Search
  • Menu Menu

WHAT IS A “CYBER SECURITY INCIDENT”?

Cyber security incidents are crimes committed with a computer or through the use of the internet (i.e. a physical or digital breach) with the goal of infiltrating an organization’s information systems to cause damage, obtain confidential data, or both. Depriving organizations access to their own data or servers can also be a goal of threat actors (those who perpetrate cyber crimes), who can then extort organisations or resell stolen data for profit.

Some examples of different types of cyber security incidents are:

  • Ransomware – When malicious software (i.e.: Malware) gains access to a company’s network and encrypts all or some of the files contained within same. The company can no longer gain access to the encrypted files, unless a ransom is paid, failing which the files could become unrecoverable. A twist has been added in recent years to encourage ransom payment: threat actors duplicate sensitive files before initiating the encryption and not only deprive victims of access to their data, but also threaten release of sensitive information should the ransom not be paid, to inflict reputation damage upon the companies.
  • Insider Attacks – When trusted employees misuse access to a company’s systems maliciously, to steal or damage sensitive data. While these attacks are usually intentional in nature, they can also occur as a result of an employees actions, for example by not applying the best practices when accessing a company’s network and inadvertently causes a breach.
  • DoS Attacks – When threat actors intentionally overwhelm a company’s website, rendering it inaccessible for business. They can also be used to distract companies, while threat actors attempt to gain access to a company’s system and steal confidential information, for example credit card information of the businesses’ customers.
  • Phishing – When threat actors employ devious techniques to trick recipients into taking action. The most prototypical example is large email campaigns which are automated and sent to a wide audience in the hopes that a small percentage of recipients will “take the bait” and click on a link which could automatically download malware onto a server to cause damage or steal sensitive information. The emails usually appear as if they originate from a trusted source and create a sense of urgency. For example, emails seemingly being sent by your bank, informing you that your account has been compromised and requesting that you act immediately to secure your account by clicking on a specific link.

WHO IS AT RISK?

The short answer is that any entity using computers or the internet to power their business is at risk. However, there is a noticeable trend as to who threat actors perceive as the most attractive target: small and medium businesses. The reason is simple: bigger and more established companies tend to have the resources to implement more complex security architecture to protect themselves from threats. Small and medium-sized companies tend to be more conscious of diverting hard won capital from the growth of their business and investing in the implementation of network security solutions, which can be costly and burdensome to comparatively small workforce.

There is also a question of perception. Simply put, until it happens, no one really believes that they are at risk for cyberattacks, nor do they understand the extent to which such events can debilitate their business.

The number of successful cyberattacks in Canada is rising sharply year over year, with a more effective “hit rate” – successful attacks which become an incident . What’s more, the down time associated with these attacks is increasing: small and medium businesses can expect a downtime ranging from 12 to 18 days with full system recovery being obtained by an average of 25.6 days . The changing political landscape and increasing use of cyber warfare to achieve geopolitical gains are fuelling predictions of increased digital security events in the foreseeable future. Cyberattacks have become an undeniable threat to our economy and a global call to action has been sounded to increase industry’s resistance and recovery capabilities.

YOUR TEAM

MARY DELLI QUADRI
https://www.gascon.ca/en/mary-delli-quadri/

MARY DELLI QUADRI

Attorney, Partner
Gascon
ALEXANDRA KALLOS
https://www.gascon.ca/en/alexandra-kallos/

ALEXANDRA KALLOS

Senior Counsel
Gascon

THESE PUBLICATIONS MIGHT INTEREST YOU

CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

CYBERSECURITY
“I would never fall for a scam! I’m smarter than that, it could never happen to me!”    As a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use…
Read more
February 23, 2024
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Evelyne Chiasson https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Evelyne Chiasson2024-02-23 09:18:582024-02-23 09:21:15CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

BUSINESS LAW, CYBERSECURITY, INTELLECTUAL PROPERTY / IT, LITIGATION, REAL ESTATE LAW
As a kick-off to our educational series, we delve into explaining one such crucial industry term, "Zero-Day Exploit." In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This…
Read more
October 24, 2023
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Karine Blais https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Karine Blais2023-10-24 12:17:142023-12-01 17:36:50UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

BUSINESS LAW, CYBERSECURITY, LITIGATION, REAL ESTATE LAW
Introduction Artificial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the…
Read more
March 1, 2023
https://gasc.sltm.ca/wp-content/uploads/2021/11/VisuelsBlogue-Autres2.jpg 628 1200 C4 Communications https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png C4 Communications2023-03-01 17:30:342023-12-01 17:36:38ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

Categories

  • BUSINESS LAW
  • COVID-19 LEGAL IMPACTS
  • CYBERSECURITY
  • DATA CENTERS
  • FIRM NEWS
  • INSURANCE
  • INTELLECTUAL PROPERTY / IT
  • LITIGATION
  • REAL ESTATE LAW
  • RECENT WORK
  • STARTUP G
© All Rights Reserve - Gascon & Associates L.L.P. Web Design C4 Communications.
  • LinkedIn
  • Contact
  • Legal Notice
  • Privacy Statement
  • Cookie Policy
Scroll to top
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}