Passer au contenu principal

Cybersecurity in Canada: Context and Resources  

As part of the Rencontres de Génie, Genium 360 presented its second webinar in a series of three, focusing mainly on the cybersecurity of operational technologies. It was the turn of Véronique Ménard of the Canadian Center for Cyber ​​Security (CCC) to deepen the context of collaboration in cybersecurity in the country. She outlined the main threats we face, then provided multiple resources to help organizations protect themselves.

Cyber Threat Trends

The digitization of our data may make our lives easier, but it exponentially exposes us to cyberthreats. According to Ms. Ménard, we are facing five major trends that have an impact on our security:

  1. Threat to our physical security, especially with remotely driven vehicles or medical devices connected to the Internet.
  2. Threat to our digital economy, which relies on internet connection.
  3. Threat to our privacy: the digitization of our habits, our purchases or our information makes us vulnerable, not to mention that the systems for analyzing this data are increasingly efficient.
  4. Cybercriminals are getting more and more efficient. We sometimes have the impression that our devices are secure, but synchronizing them increases our fragility.
  5. Threat to critical infrastructure connected to the Internet. As soon as remote control is possible, the risk increases.

What tactics do cyber criminals use? 

The method of choice remains phishing, partly because it is very effective. By sending an email or text message, the individual is tricked into clicking on a link, which results in downloading malware. We also find these famous fake web pages, where our personal information will be entered, then stolen immediately.

A second popular type of attack is ransomware. We must be careful, because it is by opening the spam that the malware will be installed, which require a rancon payable with a deadline to recover our data.

According to Ms. Ménard, no one is immune. For businesses, the most effective protection method is to have critical employees who are well trained in cybersecurity, and most importantly, attentive to detail. Regular backups of our data can also save us a lot of trouble. She recalls that some American cities have been paralyzed for months after being victims of ransomware.

Operational technologies (OT) : major challenges 

OT face particular challenges. As we often deal with machinery designed 30 years ago, there is no protection against cyber attacks.

In the end, no service provides cyber security from A to Z. While each step in the chain of supply is framed, he found a fragmented security because incoherent. From design to production, then from delivery to operations and maintenance, the risk is great. In recent years, a sizeable breach has been added: information technologies are now the entry points of choice for accessing TOs.

Read more on the links between IT and TO : 

Resources suggested by Véronique Ménard : 

For everyone: 

The Canadian Center for Cyber ​​Security :

Think cybersecurity – accessible and user- friendly resource , awareness campaigns ):

CIRA’s Canadian Shield (free for individuals) :

For organizations : 

Assembly Line (free) – a malware analysis and detection tool , designed by CCC and made available to the cybersecurity community :

Carrefour learning – training in cybersecurity :

Geekweek – annual collaborative cybersecurity workshop :

To report a fraud: 

Canadian Anti-Fraud Center :

Spam Notification Center :