Canada: Cybersecurity Now! Cybersecurity Guidance For Yahoo!, Your Dry Cleaner And Everyone In Between

Last Updated: September 30 2019
Article by Nathan Schissel and Jeremy Barber

Cybersecurity incidents have a tendency to grab headlines and compromise business value. Recently, we posted about the impact two major cybersecurity breaches had on Yahoo! ("Yahoo"). Hackers managed to gain access to vast databases of Yahoo users' information. When Yahoo eventually disclosed the breach, it caused Yahoo's market capitalization to fall by almost $1.3 billion. It was a cautionary tale that simultaneously reminded business people of the reality of cybersecurity threats and the value of transparency and preparedness in dealing with them.

This cautionary tale does not apply exclusively to tech giants. In March of 2019, the Canadian Centre for Cyber Security (the "CCCS") – an agency of the Canadian federal government – published the Baseline Cyber Security Controls for Small and Medium Organizations (the "Baseline Controls").

The document's introduction notes that, in fact, small- and medium-sized organizations are most likely to be affected by cybercrime, and goes on to explain how small- and medium-sized businesses can protect themselves in the face of cybersecurity threats.

The Baseline Controls were put together with two basic propositions in mind:

  1. cybersecurity is a critically important aspect of today's business landscape; and
  2. despite its importance, small- and medium-sized businesses simply do not have unlimited financial and human resources to pour into cybersecurity.

The happy result of the CCCS's work on the Baseline Controls is a document that offers guidance to small- and medium-sized businesses that is both relevant and attainable. With the right team in place, any forward-looking small- or medium-sized business can implement the Baseline Controls. These measures may prove invaluable for the sustainability and success of your business.

The Baseline Controls

The CCCS begins its discussion of the Baseline Controls with a sobering statement that speaks to the importance and imminence of cybersecurity in today's business environment:

"We recommend that organizations adopt the thinking that they will suffer a data breach at some point and thus be in a position to detect, respond and recover."

Implicit in this statement is an unmistakable sense of urgency. As soon as we accept that most business people will one day be tasked with managing their businesses and stakeholders through a cybersecurity crisis, we should also accept that "one day" may come sooner than we think.

The Baseline Controls are, in effect, a series of recommendations business people can operationalize to help mitigate cybersecurity risks.

Below are brief explanations of each recommendation made by the CCCS in the Baseline Controls document, to help business people understand how the recommendations might relate to their businesses.

  • Develop an incident response plan. This plan is the roadmap that will guide your business through a cybersecurity crisis. This plan should contain policies for detecting, monitoring and responding to cybersecurity incidents; and identify responsible persons. Businesses may also consider a cybersecurity insurance policy to cover incident response and recovery activities.
  • Automatically patch operating systems and applications. Sometimes software publishers make mistakes in developing their products that can be used by cybercriminals to put your business at risk. Publishers will frequently fix their mistakes and improve the security of their software by issuing "patches" or updates. Operating systems like Microsoft Windows and macOS can be set to automatically download and install updates. The same is true of other software applications still supported by their publishers. By setting operating systems and applications to update automatically, you significantly reduce your cybersecurity risk.
  • Enable security software. There is a wide range of software designed to protect your computer systems against known malware (i.e. viruses, worms, Trojan horses, ransomware, spyware, etc.). Enabling this software on your business's connected devices is an easy step toward securing your business from cyberthreats.
  • Securely configure devices. The computers, phones and other technology you use in your business often have weak security settings enabled when you take them out of the box. This allows businesses to deploy technology quickly and start realizing its benefits. However, it's important to change default passwords that can become public and represent a cybersecurity threat, and take other steps to ensure similar security gaps are covered quickly and effectively.
  • Use strong user authentication. There are a number of ways you can ensure only people you trust can access your business's information systems. Strong password policies and two-factor authentication represent two such options that are easily implemented and can improve cybersecurity.
  • Provide employee awareness training. Cybersecurity threats such as email phishing scams are often designed to take advantage of unsuspecting employees. Your people are just as important as leading-edge technological measures for keeping your business safe. The value of cybersecurity training for employees cannot be overstated.
  • Backup and encrypt data. The digital equivalent of putting your jewelry in a safe. When you backup your data, you capture the value wrapped up in it. If the worst happens, you can swap out your compromised data for the backup and get back to business. Encrypting your data means putting that data under a digital lock-and-key to make sure it's safe and ready when you need it.
  • Secure mobility. Like any other connected device, mobile phones pose certain cybersecurity risks that need to be audited and addressed. Policies that keep work and personal data separate on employees' mobile phones, and training employees about the risks of apps from untrustworthy sources and about the risks of data interception through Bluetooth or Wi-Fi services are just a few of the issues to consider.
  • Establish basic perimeter defenses. Your business's network is like a private island. It's made of a series of computers, servers, mobile devices and other technology that all work together to help run your business. Your island connects to the outside world through the internet. It’s important to secure the boundary between your private network and the internet to keep unwanted visitors out and away from your valuable systems. Technologies like firewalls, virtual private networks, and integrated point-of-sale systems are all mechanisms you can use to secure the boundary and keep your information systems safe.
  • Secure cloud and outsourced IT services. Many small- and medium-sized businesses rely on service providers for cloud and other information technology services. Just like your business offers a unique value proposition to win business, so do cloud and IT service providers. Some may offer leading-edge security tech at a high price, while others offer basic security tech at a more affordable price. It is important to familiarize yourself with the service offerings of your business’s service providers and compare those offerings with legal requirements and industry best practices to ensure you are comfortable with the level of security you are signing off on.
  • Secure websites. If your business collects customer data through its website, it may be appropriate to consider implementing tried-and-tested security standards to a make sure customer data is secure.
  • Implement access control and authorization. It is unlikely that every employee needs access to every aspect of your business's information system. Controlling access to your systems so employees only have the access they need to perform their work function is a risk-minimization strategy that not only decreases the likelihood of unauthorized access to your business's information systems, but will shorten the list of people who could be responsible for such unauthorized access. This makes it easier to identify the cybersecurity threat and respond appropriately.
  • Secure portable media. Storage devices like USB flash drives are easy to lose by theft, carelessness or otherwise. This can lead to unauthorized access to sensitive business information. Policies requiring use of pre-approved storage devices and encryption technology can mitigate these risks.

Key Questions for Businesses

Reviewing the CCCS's Baseline Controls gives rise to a number of important big-picture questions:

  • What damage could a cybersecurity attack cause to my business?
  • What level of protection is appropriate for the information controlled by my business?
  • How does my investment level in cybersecurity compare to similar businesses?
  • Where do I start?

MLT Aikins has the right combination of legal and IT industry experience to help you navigate the cybersecurity landscape. Our legal team has specific experience in the areas of information technology, cybersecurity, IT/IP litigation and privacy.

We can help you understand the legal risks related to cybersecurity, assist you with policy development to mitigate cybersecurity risk, collaborate with you on an incident response plan, and advise you of the legal requirements your business may be subject to in the event of a cybersecurity incident.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Authors
Similar Articles
Relevancy Powered by MondaqAI
 
In association with
Related Topics
 
Similar Articles
Relevancy Powered by MondaqAI
Related Articles
 
Related Video
Up-coming Events Search
Tools
Print
Font Size:
Translation
Channels
Mondaq on Twitter
 
Mondaq Free Registration
Gain access to Mondaq global archive of over 375,000 articles covering 200 countries with a personalised News Alert and automatic login on this device.
Mondaq News Alert (some suggested topics and region)
Select Topics
Registration (please scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.

Disclaimer

The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.

General

Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions