{"id":2441,"date":"2013-03-10T00:00:00","date_gmt":"2013-03-10T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/10\/canadian-businesses-are-resigning-themselves-to-being-hacked-study-canadian-business\/"},"modified":"2021-12-30T11:41:20","modified_gmt":"2021-12-30T11:41:20","slug":"canadian-businesses-are-resigning-themselves-to-being-hacked-study-canadian-business","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/03\/10\/canadian-businesses-are-resigning-themselves-to-being-hacked-study-canadian-business\/","title":{"rendered":"Canadian businesses are resigning themselves to being hacked: study &#8211; Canadian Business"},"content":{"rendered":"<p>Canadian businesses have set themselves up to be hacked, and a new study has found that some companies believe that it\u2019s almost inevitable they\u2019ll fall victim to a security breach. Telus and the Rotman School of Management at the University of Toronto says its annual study on IT security found a \u201cpervasive sense of vulnerability\u201d at many corporations. \u201cSecurity managers are not very confident that they can identify whether a breach actually occurred or whether they\u2019re actually in the midst of a current breach,\u201d said Walid Hejazi, a professor of business economics at Rotman.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In one of the interviews, a chief information officer for a large company, told Hejazi that when he was hired, he laid it out for his bosses. Hejazi said the findings are reminiscent of the troubles that former technology giant Nortel Networks faced when international hackers broke into its corporate computers and accessed information for nearly a decade. The Nortel security breach gave hackers \u201cplenty of time\u201d and \u201caccess to everything,\u201d according to 19-year Nortel veteran Brian Shields, who was behind a six-month investigation into the security breach that is believed to have started in 2000, but was only made public in 2012.<\/p>\n<p>Hejazi said that organizations that operate with a \u201cYes\u201d mentality, or are open to discussions with their staff about how to use technology responsibly, are more secure than companies with rigid security controls.  Even an attachment file can directly lead to a security breach, or using free public computers at a conference in another country that has keylogging spyware installed.<\/p>\n<p>Link: http:\/\/www.canadianbusiness.com\/business-news\/canadian-businesses-are-resigning-themselves-to-being-hacked-study\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2441","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2441","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2441"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2441\/revisions"}],"predecessor-version":[{"id":4928,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2441\/revisions\/4928"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}