{"id":9039,"date":"2024-01-12T18:20:02","date_gmt":"2024-01-12T22:20:02","guid":{"rendered":"https:\/\/www.gascon.ca\/?page_id=9039"},"modified":"2024-02-27T10:50:42","modified_gmt":"2024-02-27T14:50:42","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_textblock  avia-builder-el-first   container_wrap sidebar_right'  >\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92\">\n#top #wrap_all .avia-slideshow .av-slideshow-caption.av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92__0 .avia-caption-title{\nfont-size:30px;\ncolor:#565a5d;\n}\n#top .avia-slideshow .av-slideshow-caption.av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92__0 .avia-caption-content{\nfont-size:18px;\ncolor:#565a5d;\n}\n#top .avia-slideshow .av-slideshow-caption.av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92__0 .avia-caption-content p{\nfont-size:18px;\n}\n<\/style>\n<div  class='avia-slideshow av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92 avia-slideshow-no scaling av_slideshow_full avia-slide_up-slider av-slideshow-ui av-control-hidden av-no-slider-navigation av-hide-nav-arrows av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide_up&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:true,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 27.066666666667%;'><li  class='avia-slideshow-slide av-70kozt-2bd54adf1aa9a78464634cd5a3e89f92__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '   ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-9020 avia-img-lazy-loading-not-9020\"  src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite.jpg\" width=\"1500\" height=\"406\" title='entete-cybersecurite' alt=''  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite.jpg 1500w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-300x81.jpg 300w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-1030x279.jpg 1030w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-768x208.jpg 768w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2024\/01\/entete-cybersecurite-705x191.jpg 705w\" sizes=\"(max-width: 1500px) 100vw, 1500px\" \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-9039'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-lpsg5ul6-6cfe1841060d84281be144b97c2c69e2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h1>Cybersecurity<\/h1>\n<div  class='hr av-47402x-d3c699709f21cace53866f2d960197b2 hr-full  avia-builder-el-2  avia-builder-el-no-sibling  hr-no-shadow'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<p>The internet has completely changed the way that we all do business. Our firm can help you navigate this new landscape, notably by addressing the threats caused by modern criminals (or Threat Actors) who have capitalized on change to exploit weaknesses and infiltrate networks to wreak havoc. Mitigation techniques can be implemented at different phases in the lifecycle of your business:<\/p>\n<p>1. <span style=\"color: #183f54;\"><a style=\"color: #183f54;\" href=\"https:\/\/www.gascon.ca\/en\/incident-response-planning\/\">Preparing your business for a cyber incident before one occurs, by completing an incident response plan with the assistance of a professional<\/a><\/span><br \/>\n2.<span style=\"color: #183f54;\"> <a style=\"color: #183f54;\" href=\"https:\/\/www.gascon.ca\/en\/breach-coaching\/\">Calling on a breach coach in the event of an active cyber incident<\/a><\/span><br \/>\n3. <span style=\"color: #183f54;\"><a style=\"color: #183f54;\" href=\"https:\/\/www.gascon.ca\/en\/loss-and-liability-mitigation\/\">Protecting your business from the fallout of a cyber security incident in the weeks and months following an attack<\/a><\/span><br \/>\n3. <span style=\"color: #183f54;\"><a style=\"color: #183f54;\" href=\"https:\/\/www.gascon.ca\/en\/who-is-at-risk\/\">Who is at risk?<\/a><\/span><\/p>\n<p>Our cybersecurity team can help you implement each of these phases, adapting them to your business\u2019s needs.<\/p>\n<\/div><\/section>\n<div  class='hr av-2j1kux-ffe06f8df4792cad0c5814d384b07cf0 hr-default  avia-builder-el-3  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-lpsg9h5d-c62084f6facff1e51810cd7b25498add '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h2>THESE PUBLICATIONS MIGHT INTEREST YOU<\/h2>\n<\/div><\/section>\n<div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-5  el_after_av_textblock  avia-builder-el-last  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-9293 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/' data-rel='slide-1' class='slide-image' title='CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg\" class=\"wp-image-8567 avia-img-lazy-loading-not-8567 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg 495w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/' title='CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION'>CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\u201cI would never fall for a scam! I\u2019m smarter than that, it could never happen to me!\u201d\u00a0\r\n\r\n&nbsp;\r\n\r\nAs a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2024\/02\/23\/confessions-of-a-cybersecurity-lawyer-on-dodging-deception\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-02-23T09:18:58-04:00\" >February 23, 2024<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>708<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1515<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Evelyne Chiasson<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Evelyne Chiasson<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:02-04:00\" >2024-02-23 09:18:58<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2024-02-23 09:21:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-8507 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail posttype-post post-format-image'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/' data-rel='slide-1' class='slide-image' title='UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg\" class=\"wp-image-8567 avia-img-lazy-loading-not-8567 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-495x400.jpg 495w, https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1-845x684.jpg 845w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/' title='UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS'>UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/business-law\/\" rel=\"tag\">BUSINESS LAW<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/intellectual-property-it\/\" rel=\"tag\">INTELLECTUAL PROPERTY \/ IT<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/litigation\/\" rel=\"tag\">LITIGATION<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/real-estate-law\/\" rel=\"tag\">REAL ESTATE LAW<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >As a kick-off to our educational series, we delve into explaining one such crucial industry term, \"Zero-Day Exploit.\" In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2023\/10\/24\/dive-into-zero-day-exploits\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-10-24T12:17:14-04:00\" >October 24, 2023<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2023\/10\/AK_Blog-1.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>708<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1515<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Karine Blais<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Karine Blais<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:02-04:00\" >2023-10-24 12:17:14<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-12-01 17:36:50<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>UNDETECTED &#038; UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-7780 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/' data-rel='slide-1' class='slide-image' title='ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE'><img decoding=\"async\" fetchpriority=\"high\" width=\"495\" height=\"400\" src=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/VisuelsBlogue-Autres2-495x400.jpg\" class=\"wp-image-6340 avia-img-lazy-loading-not-6340 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/' title='ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE'>ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE<\/a><\/h3><span class=\"blog-categories minor-meta\"><a href=\"https:\/\/gasc.sltm.ca\/en\/category\/business-law\/\" rel=\"tag\">BUSINESS LAW<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/cybersecurity\/\" rel=\"tag\">CYBERSECURITY<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/litigation\/\" rel=\"tag\">LITIGATION<\/a>, <a href=\"https:\/\/gasc.sltm.ca\/en\/category\/real-estate-law\/\" rel=\"tag\">REAL ESTATE LAW<\/a> <\/span><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Introduction\r\n\r\nArti\ufb01cial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the\u2026<div class=\"read-more-link\"><a href=\"https:\/\/gasc.sltm.ca\/en\/2023\/03\/01\/artificial-intelligences-impact-on-cybersecurity-and-cyber-insurance\/\" class=\"more-link\">Read more<span class=\"more-link-arrow\"><\/span><\/a><\/div><\/div><\/div><footer class=\"entry-footer\"><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-01T17:30:34-04:00\" >March 1, 2023<\/time><\/div><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2021\/11\/VisuelsBlogue-Autres2.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>628<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1200<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>C4 Communications<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.gascon.ca\/wp-content\/uploads\/2018\/09\/Logo_Gascon_EN-1.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>C4 Communications<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2024-01-12T18:20:02-04:00\" >2023-03-01 17:30:34<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2023-12-01 17:36:38<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>ARTIFICIAL INTELLIGENCE\u2019S IMPACT ON CYBERSECURITY AND CYBER INSURANCE<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm<\/title>\n<meta name=\"description\" content=\"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm\" \/>\n<meta property=\"og:description\" content=\"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Gascon\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T14:50:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2018\/09\/Visuel_Post_Facebook.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/\",\"url\":\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/\",\"name\":\"Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm\",\"isPartOf\":{\"@id\":\"https:\/\/gasc.sltm.ca\/#website\"},\"datePublished\":\"2024-01-12T22:20:02+00:00\",\"dateModified\":\"2024-02-27T14:50:42+00:00\",\"description\":\"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gasc.sltm.ca\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gasc.sltm.ca\/#website\",\"url\":\"https:\/\/gasc.sltm.ca\/\",\"name\":\"Gascon\",\"description\":\"Cabinet d\u2019avocats Gascon et associ\u00e9s\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gasc.sltm.ca\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm","description":"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm","og_description":"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.","og_url":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/","og_site_name":"Gascon","article_modified_time":"2024-02-27T14:50:42+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/gasc.sltm.ca\/wp-content\/uploads\/2018\/09\/Visuel_Post_Facebook.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/","url":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/","name":"Cybersecurity, Cybersecurity Law, Montreal - Gascon Law Firm","isPartOf":{"@id":"https:\/\/gasc.sltm.ca\/#website"},"datePublished":"2024-01-12T22:20:02+00:00","dateModified":"2024-02-27T14:50:42+00:00","description":"Gascon can help you navigate through cybersecurity issues, cybersecurity law, and what you need to deal with these issues and regulations.","breadcrumb":{"@id":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gasc.sltm.ca\/en\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gasc.sltm.ca\/en\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gasc.sltm.ca\/en\/"},{"@type":"ListItem","position":2,"name":"CYBERSECURITY"}]},{"@type":"WebSite","@id":"https:\/\/gasc.sltm.ca\/#website","url":"https:\/\/gasc.sltm.ca\/","name":"Gascon","description":"Cabinet d\u2019avocats Gascon et associ\u00e9s","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gasc.sltm.ca\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages\/9039"}],"collection":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/comments?post=9039"}],"version-history":[{"count":2,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages\/9039\/revisions"}],"predecessor-version":[{"id":9401,"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/pages\/9039\/revisions\/9401"}],"wp:attachment":[{"href":"https:\/\/gasc.sltm.ca\/en\/wp-json\/wp\/v2\/media?parent=9039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}