{"id":9033,"date":"2024-01-12T18:20:01","date_gmt":"2024-01-12T22:20:01","guid":{"rendered":"https:\/\/www.gascon.ca\/?page_id=9033"},"modified":"2024-01-12T19:10:08","modified_gmt":"2024-01-12T23:10:08","slug":"who-is-at-risk","status":"publish","type":"page","link":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/","title":{"rendered":"Who is at risk?"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_textblock  avia-builder-el-first   container_wrap sidebar_right'  >\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7\">\n#top #wrap_all .avia-slideshow .av-slideshow-caption.av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7__0 .avia-caption-title{\nfont-size:30px;\ncolor:#565a5d;\n}\n#top .avia-slideshow .av-slideshow-caption.av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7__0 .avia-caption-content{\nfont-size:18px;\ncolor:#565a5d;\n}\n#top .avia-slideshow .av-slideshow-caption.av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7__0 .avia-caption-content p{\nfont-size:18px;\n}\n<\/style>\n<div  class='avia-slideshow av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7 avia-slideshow-no scaling av_slideshow_full avia-slide_up-slider av-slideshow-ui av-control-hidden av-no-slider-navigation av-hide-nav-arrows av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide_up&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:true,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 27.066666666667%;'><li  class='avia-slideshow-slide av-lpsss40y-d0de989b01870e608d433a9a5b3b71f7__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-9020 avia-img-lazy-loading-not-9020\"  src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite.jpg\" width=\"1500\" height=\"406\" title='entete-cybersecurite' alt=''  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite.jpg 1500w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-300x81.jpg 300w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-1030x279.jpg 1030w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-768x208.jpg 768w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-705x191.jpg 705w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-9033'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-lpsssiov-fad4d9f20e0eeec196839d9e0cb27bdc '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>WHAT IS A \u201cCYBER SECURITY INCIDENT\u201d?<\/h1>\n<div  class='hr av-o5e75z-d990bca634929abbe0f313a7a0a180a3 hr-full  avia-builder-el-2  avia-builder-el-no-sibling  hr-no-shadow'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<p>Cyber security incidents are crimes committed with a computer or through the use of the internet (i.e. a physical or digital breach) with the goal of infiltrating an organization\u2019s information systems to cause damage, obtain confidential data, or both. Depriving organizations access to their own data or servers can also be a goal of threat actors (those who perpetrate cyber crimes), who can then extort organisations or resell stolen data for profit.<\/p>\n<p>Some examples of different types of cyber security incidents are:<\/p>\n<ul>\n<li>Ransomware \u2013 When malicious software (i.e.: Malware) gains access to a company\u2019s network and encrypts all or some of the files contained within same. The company can no longer gain access to the encrypted files, unless a ransom is paid, failing which the files could become unrecoverable. A twist has been added in recent years to encourage ransom payment: threat actors duplicate sensitive files before initiating the encryption and not only deprive victims of access to their data, but also threaten release of sensitive information should the ransom not be paid, to inflict reputation damage upon the companies.<\/li>\n<li>Insider Attacks \u2013 When trusted employees misuse access to a company\u2019s systems maliciously, to steal or damage sensitive data. While these attacks are usually intentional in nature, they can also occur as a result of an employees actions, for example by not applying the best practices when accessing a company\u2019s network and inadvertently causes a breach.<\/li>\n<li>DoS Attacks \u2013 When threat actors intentionally overwhelm a company\u2019s website, rendering it inaccessible for business. They can also be used to distract companies, while threat actors attempt to gain access to a company\u2019s system and steal confidential information, for example credit card information of the businesses\u2019 customers.<\/li>\n<li>Phishing \u2013 When threat actors employ devious techniques to trick recipients into taking action. The most prototypical example is large email campaigns which are automated and sent to a wide audience in the hopes that a small percentage of recipients will \u201ctake the bait\u201d and click on a link which could automatically download malware onto a server to cause damage or steal sensitive information. The emails usually appear as if they originate from a trusted source and create a sense of urgency. For example, emails seemingly being sent by your bank, informing you that your account has been compromised and requesting that you act immediately to secure your account by clicking on a specific link.<\/li>\n<\/ul>\n<h2>WHO IS AT RISK?<\/h2>\n<p>The short answer is that any entity using computers or the internet to power their business is at risk. However, there is a noticeable trend as to who threat actors perceive as the most attractive target: small and medium businesses. The reason is simple: bigger and more established companies tend to have the resources to implement more complex security architecture to protect themselves from threats. Small and medium-sized companies tend to be more conscious of diverting hard won capital from the growth of their business and investing in the implementation of network security solutions, which can be costly and burdensome to comparatively small workforce.<\/p>\n<p>There is also a question of perception. Simply put, until it happens, no one really believes that they are at risk for cyberattacks, nor do they understand the extent to which such events can debilitate their business.<\/p>\n<p>The number of successful cyberattacks in Canada is rising sharply year over year, with a more effective \u201chit rate\u201d \u2013 successful attacks which become an incident . What\u2019s more, the down time associated with these attacks is increasing: small and medium businesses can expect a downtime ranging from 12 to 18 days with full system recovery being obtained by an average of 25.6 days . The changing political landscape and increasing use of cyber warfare to achieve geopolitical gains are fuelling predictions of increased digital security events in the foreseeable future. Cyberattacks have become an undeniable threat to our economy and a global call to action has been sounded to increase industry\u2019s resistance and recovery capabilities.<\/p>\n<\/div><\/section>\n<div  class='hr av-m5or2f-c382b79940ecded3df0e953fc886f6bc hr-default  avia-builder-el-3  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-lhnp3b-62766aebd5b815d10d65c5f0f5eccefe '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>YOUR TEAM<\/h2>\n<\/div><\/section>\n<div class='flex_column_table av-av_one_half-efd89a16f247fc4072dac3a470f9648f sc-av_one_half av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_half-efd89a16f247fc4072dac3a470f9648f\">\n.flex_column.av-av_one_half-efd89a16f247fc4072dac3a470f9648f{\nborder-radius:0px 0px 0px 0px;\npadding:10px 10px 10px 10px;\n}\n<\/style>\n<div  class='flex_column av-av_one_half-efd89a16f247fc4072dac3a470f9648f av_one_half  avia-builder-el-5  el_after_av_textblock  el_before_av_one_half  first no_margin flex_column_table_cell av-equal-height-column av-align-top av-animated-generic pop-up  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_team_member-d9e069a00de61fb492405d56893fdc15\">\n#top #wrap_all .avia-team-member.av-av_team_member-d9e069a00de61fb492405d56893fdc15 .team-member-name{\ncolor:#007ed1;\n}\n.avia-team-member.av-av_team_member-d9e069a00de61fb492405d56893fdc15 .team-member-job-title{\ncolor:#007ed1;\n}\n.avia-team-member.av-av_team_member-d9e069a00de61fb492405d56893fdc15 .team-member-description{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='avia-team-member av-av_team_member-d9e069a00de61fb492405d56893fdc15  avia-builder-el-6  avia-builder-el-no-sibling  team-champs'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><div class=\"team-img-container\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-4556 avia-img-lazy-loading-not-4556 avia_image avia_image_team av-team-img-original' src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-180x180.jpg\" alt='MARY DELLI QUADRI'  itemprop=\"image\"   height=\"180\" width=\"180\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-180x180.jpg 180w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-80x80.jpg 80w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-36x36.jpg 36w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-120x120.jpg 120w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2020\/11\/MARY_DQ-447x450.jpg 447w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/><div class=\"team-social\"><div class=\"team-social-inner\"><span class='hidden av_member_url_markup '  itemprop=\"url\" >https:\/\/www.gascon.ca\/en\/mary-delli-quadri\/<\/span><a href='https:\/\/www.gascon.ca\/en\/mary-delli-quadri\/' class='avia-team-icon av-av_team_icon-e794d19411791c40d90fbbc50eb8ad11' rel='v:url' data-avia-tooltip=\"Profil complet\"  aria-hidden='true' data-av_icon='\ue80c' data-av_iconfont='entypo-fontello'><\/a><\/div><\/div><\/div><h3 class='team-member-name '  itemprop=\"name\" >MARY DELLI QUADRI<\/h3><div class='team-member-job-title av_opacity_variation'  itemprop=\"jobTitle\" >Attorney, Partner<\/div><span class='hidden team-member-affiliation'  itemprop=\"affiliation\" >Gascon<\/span><\/section><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_one_half-6784dec351202caeb2c0ac73379c9ca6\">\n.flex_column.av-av_one_half-6784dec351202caeb2c0ac73379c9ca6{\nborder-radius:0px 0px 0px 0px;\npadding:10px 10px 10px 10px;\n}\n<\/style>\n<div  class='flex_column av-av_one_half-6784dec351202caeb2c0ac73379c9ca6 av_one_half  avia-builder-el-7  el_after_av_one_half  el_before_av_hr  no_margin flex_column_table_cell av-equal-height-column av-align-top av-animated-generic pop-up  column-top-margin'     ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_team_member-5b50c9d362a94f993738d37d071f3f82\">\n#top #wrap_all .avia-team-member.av-av_team_member-5b50c9d362a94f993738d37d071f3f82 .team-member-name{\ncolor:#007ed1;\n}\n.avia-team-member.av-av_team_member-5b50c9d362a94f993738d37d071f3f82 .team-member-job-title{\ncolor:#007ed1;\n}\n.avia-team-member.av-av_team_member-5b50c9d362a94f993738d37d071f3f82 .team-member-description{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='avia-team-member av-av_team_member-5b50c9d362a94f993738d37d071f3f82  avia-builder-el-8  avia-builder-el-no-sibling  team-champs'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><div class=\"team-img-container\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-6098 avia-img-lazy-loading-not-6098 avia_image avia_image_team' src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/AK_PORTRAIT-e1698246387152-180x180.jpg\" alt='ALEXANDRA KALLOS'  itemprop=\"image\"   height=\"180\" width=\"180\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/AK_PORTRAIT-e1698246387152-180x180.jpg 180w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/AK_PORTRAIT-e1698246387152-80x80.jpg 80w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/AK_PORTRAIT-e1698246387152-36x36.jpg 36w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/><div class=\"team-social\"><div class=\"team-social-inner\"><span class='hidden av_member_url_markup '  itemprop=\"url\" >https:\/\/www.gascon.ca\/en\/alexandra-kallos\/<\/span><a href='https:\/\/www.gascon.ca\/en\/alexandra-kallos\/' class='avia-team-icon av-av_team_icon-7d3bb43a3eb3fdd591621900cac0a98d' rel='v:url' data-avia-tooltip=\"Profil complet\"  aria-hidden='true' data-av_icon='\ue80c' data-av_iconfont='entypo-fontello'><\/a><\/div><\/div><\/div><h3 class='team-member-name '  itemprop=\"name\" >ALEXANDRA KALLOS<\/h3><div class='team-member-job-title av_opacity_variation'  itemprop=\"jobTitle\" >Senior Counsel<\/div><span class='hidden team-member-affiliation'  itemprop=\"affiliation\" >Gascon<\/span><\/section><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<div  class='hr av-guywn-1da1c1266a956cb04375f979fb698aa2 hr-default  avia-builder-el-9  el_after_av_one_half  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-2qm7p3-8b59a092e50602d3ee12a856606e2151 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>THESE PUBLICATIONS MIGHT INTEREST YOU<\/h2>\n<\/div><\/section>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-11  el_after_av_textblock  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-9293 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/' data-rel='slide-1' class='slide-image' title='CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg\" class=\"wp-image-8567 avia-img-lazy-loading-not-8567 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg 495w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/' title='CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION'>CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\u201cI would never fall for a scam! I\u2019m smarter than that, it could never happen to me!\u201d\u00a0\r\n\r\n&nbsp;\r\n\r\nAs a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-23T09:18:58-04:00\" >February 23, 2024<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>708<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1515<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Evelyne Chiasson<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Evelyne Chiasson<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:01-04:00\" >2024-02-23 09:18:58<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2024-02-23 09:21:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-8507 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-image'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/' data-rel='slide-1' class='slide-image' title='UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg\" class=\"wp-image-8567 avia-img-lazy-loading-not-8567 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg 495w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/' title='UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS'>UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/business-law\/\" rel=\"tag\">BUSINESS LAW<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/intellectual-property-it\/\" rel=\"tag\">INTELLECTUAL PROPERTY \/ IT<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/litigation\/\" rel=\"tag\">LITIGATION<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/real-estate-law\/\" rel=\"tag\">REAL ESTATE LAW<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >As a kick-off to our educational series, we delve into explaining one such crucial industry term, \"Zero-Day Exploit.\" In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-10-24T12:17:14-04:00\" >October 24, 2023<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>708<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1515<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Karine Blais<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Karine Blais<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:01-04:00\" >2023-10-24 12:17:14<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-12-01 17:36:50<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-7780 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/' data-rel='slide-1' class='slide-image' title='ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/VisuelsBlogue-Autres2-495x400.jpg\" class=\"wp-image-6340 avia-img-lazy-loading-not-6340 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/' title='ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE'>ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/business-law\/\" rel=\"tag\">BUSINESS LAW<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/litigation\/\" rel=\"tag\">LITIGATION<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/real-estate-law\/\" rel=\"tag\">REAL ESTATE LAW<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Introduction\r\n\r\nArti\ufb01cial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-01T17:30:34-04:00\" >March 1, 2023<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/VisuelsBlogue-Autres2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>628<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1200<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>C4 Communications<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>C4 Communications<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:01-04:00\" >2023-03-01 17:30:34<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-12-01 17:36:38<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Who is at risk? - Gascon<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who is at risk? - Gascon\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Gascon\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-12T23:10:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2018\/09\/Visuel_Post_Facebook.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/\",\"url\":\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/\",\"name\":\"Who is at risk? - Gascon\",\"isPartOf\":{\"@id\":\"https:\/\/gasc.sltm.ca\/#website\"},\"datePublished\":\"2024-01-12T22:20:01+00:00\",\"dateModified\":\"2024-01-12T23:10:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gasc.sltm.ca\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who is at risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gasc.sltm.ca\/#website\",\"url\":\"https:\/\/gasc.sltm.ca\/\",\"name\":\"Gascon\",\"description\":\"Cabinet d\u2019avocats Gascon et associ\u00e9s\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gasc.sltm.ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who is at risk? - Gascon","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Who is at risk? - Gascon","og_url":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/","og_site_name":"Gascon","article_modified_time":"2024-01-12T23:10:08+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2018\/09\/Visuel_Post_Facebook.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/","url":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/","name":"Who is at risk? - Gascon","isPartOf":{"@id":"https:\/\/gasc.sltm.ca\/#website"},"datePublished":"2024-01-12T22:20:01+00:00","dateModified":"2024-01-12T23:10:08+00:00","breadcrumb":{"@id":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gasc.sltm.ca\/en\/who-is-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gasc.sltm.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Who is at risk?"}]},{"@type":"WebSite","@id":"https:\/\/gasc.sltm.ca\/#website","url":"https:\/\/gasc.sltm.ca\/","name":"Gascon","description":"Cabinet d\u2019avocats Gascon et associ\u00e9s","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gasc.sltm.ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages\/9033"}],"collection":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/comments?post=9033"}],"version-history":[{"count":0,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages\/9033\/revisions"}],"wp:attachment":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/media?parent=9033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}