Guest Post: Why Your Privacy Fears Keep Feeding the Data Machine

Posted in Commentary with tags on April 8, 2025 by itnerd

Supplied by International Drivers Association

Understanding Privacy Fears

In an era marked by the relentless surge of digital technologies, privacy fears have become a pervasive concern for individuals navigating the digital landscape. These fears are not unfounded; they are grounded in the reality that personal data is commodified and utilized by various online platforms without explicit user consent. The rising tide of privacy concerns stems from a perceived lack of control over personal information. A significant majority of Americans feel they have little to no control over the data collected about them by governments and corporations alike. This uncertainty is compounded by the complexity and opacity of data practices, leaving many in the dark about how their personal information is collected, used, and shared. The link between privacy fears and trust is particularly noteworthy. Traditionally, privacy concerns are thought to negatively impact trust; however, research has revealed that this relationship is not always straightforward. While privacy fears can indeed erode trust, some studies suggest that the dynamics between the two can vary based on context, such as the technology being used or the novelty of the data-handling processes involved. As such, understanding the intricacies of these relationships is crucial for addressing privacy concerns effectively. Additionally, the rapid advancement of technology and the resulting “data deluge” have exacerbated privacy fears, presenting risks that threaten to stifle innovation and trigger regulatory backlashes. The inability of consumers to grasp the full extent of data collection practices fuels these fears. For example, many users are unaware of the potential for re-identification of anonymized data, a factor that has profound implications for privacy and trust in digital systems. Misconceptions further cloud the landscape of privacy fears. Contrary to some beliefs, consumers do care deeply about having control over their private data, as opposed to only fearing data breaches by hackers. This desire for control is often overshadowed by the complexities of modern data ecosystems and the challenge of navigating privacy settings and policies. Understanding privacy fears requires acknowledging the legitimate concerns individuals have about data security, transparency, and control. As the digital age continues to evolve, addressing these fears with effective privacy measures and clearer communication of data practices becomes paramount. Only then can trust be rebuilt, and privacy fears mitigated in a world increasingly driven by data.

The Data Machine in Motion

In the ever-evolving digital age, the “data machine” operates with relentless precision, continuously driven by the wealth of information generated every second. As individuals navigate the online world, their actions create data footprints that feed into a larger network of data collection and analysis. This vast ecosystem is sustained by a complex interplay of data mining, consumer profiling, and digital marketing strategies aimed at enhancing user experiences and business outcomes. At the core of this machine is the concept of data collection, a methodological process critical to a business’s success. Organizations harness both primary and secondary data collection methods to gather insights, leveraging advanced technologies like artificial intelligence (AI) to optimize these processes. This approach not only boosts efficiency but also facilitates real-time decision-making and strategic planning. For instance, AI aids in categorizing survey responses and generating synthetic datasets, driving the speed and quality of data insights. However, the data machine is not without its challenges. Privacy concerns arise as data mining techniques become more prevalent, creating a need for transparent data practices and user empowerment. Tech companies are increasingly prioritizing user control over personal data, ensuring transparency in data handling, and implementing privacy-by-design principles to build trust with users. This is crucial, given the persistent myths and misconceptions that cloud public understanding of data privacy and security. Despite the regulatory frameworks in place, such as the Privacy Act of 1974 and HIPAA, which govern how data can be collected and used, the commodification of personal information persists. This underscores the importance of user consent and data minimization to mitigate privacy risks. Policymakers and businesses must balance innovation with privacy protection to prevent a regulatory backlash that could stifle the data economy. Ultimately, the data machine continues to evolve, fueled by advancements in technology and the insatiable demand for consumer insights. As organizations strive to navigate this complex landscape, they must remain vigilant in protecting user data while simultaneously harnessing the power of information to drive growth and innovation.

The Privacy-Data Cycle

In the digital age, the interplay between privacy concerns and data utilization has created a complex ecosystem where user data powers a multitude of online services, often at the cost of personal privacy. This cyclical relationship, dubbed the Privacy-Data Cycle, highlights the ongoing struggle to balance convenience and control in an increasingly data-driven world.

Data as Currency

Today, many online platforms operate on a model where services are offered “for free,” but with a caveat—users must agree to share their personal data, which in turn fuels targeted advertising that funds these services. This transaction creates a situation where privacy concerns are intrinsically tied to the services that users depend on daily. Despite growing apprehension about data security, this model persists due to the perceived value of the services provided.

Empowering Users with Control

One of the critical components in breaking or at least mitigating the adverse effects of the Privacy-Data Cycle is user empowerment. Enabling individuals to have control over their data is essential for safeguarding online privacy. Through informed consent, users are made aware of how their data will be collected and used, allowing them to make conscious decisions about their online interactions. This control not only enhances privacy but also builds trust between users and service providers.

The Role of Data Privacy Laws

The global nature of the internet poses a challenge to data privacy laws, which vary significantly from country to country. In the United States, for instance, a complex web of federal and state regulations governs the handling of personal data, aiming to protect individuals’ privacy while allowing for data-driven innovation. These laws strive to set boundaries on how data can be collected, processed, and shared, serving as a regulatory framework that can disrupt the Privacy-Data Cycle by ensuring data is handled responsibly.

Myths and Misconceptions

Amidst these dynamics, myths about data privacy continue to circulate, often clouding public understanding. One such misconception is that people prioritize protection against hackers over control of their personal data. In reality, both elements are crucial, and misconceptions can hinder meaningful discussions on how to address privacy concerns effectively.

Towards a Sustainable Model

As privacy concerns persist, the challenge remains to develop a sustainable model that respects individual privacy while supporting the data economy. Efforts to redefine consent mechanisms, enhance data security practices, and strengthen legal frameworks are vital steps in creating a digital ecosystem where privacy fears do not feed the data machine but rather inspire innovations that uphold user autonomy. This transformation is essential for building a future where privacy and data utilization coexist harmoniously.

Implications of the Data Machine

In the modern digital ecosystem, the “data machine” is an omnipresent force, shaping industries and influencing personal lives in ways that are both transformative and, at times, unsettling. As consumers generate unprecedented volumes of data, businesses harness this information to enhance consumer engagement and craft personalized experiences. The insights gleaned from big data analysis enable companies to optimize the customer journey, tailoring offerings to meet individual preferences and behaviors. However, this expansive use of data is not without significant implications.

Balancing Innovation with Privacy

The tension between leveraging data for innovation and protecting individual privacy is a central theme in the data-driven economy. Organizations are tasked with navigating complex regulatory landscapes designed to safeguard consumer data. Legislation like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) exemplifies efforts to address privacy concerns while maintaining the flow of data essential for business innovation. Companies that manage to achieve this balance can turn their privacy practices into a competitive advantage, differentiating themselves in a marketplace increasingly concerned with data ethics.

The Role of Consent and Ethical Considerations

As data privacy becomes a focal point, traditional models of consent are being scrutinized. Critics argue that simply opting into terms and conditions does not provide genuine protection in a complex data ecosystem. Ethical considerations come into play as businesses must ensure that data usage aligns with consumer expectations and regulatory standards. This involves not only complying with privacy laws but also fostering a culture of transparency and trust with consumers.

Challenges of Anonymization and Data Re-identification

The assumption that anonymized data can protect privacy is being challenged by advances in re-identification science. Studies have shown that even data stripped of personal identifiers can often be linked back to individuals, undermining privacy assurances and complicating compliance efforts. This revelation underscores the need for robust data governance frameworks capable of real-time monitoring and policy enforcement, ensuring that data remains secure and that privacy rights are respected.

Impacts on Individual Rights and Autonomy

The expansive collection and use of personal data affect more than just privacy—they influence fundamental individual rights. Without meaningful protections, there exists a significant power imbalance between individuals and the institutions that collect their data. This imbalance raises concerns about autonomy, as individuals may have limited control over how their personal information is used and shared in the digital realm. The implications of the data machine are multifaceted, requiring a nuanced approach to data management that considers ethical, legal, and societal dimensions. As businesses continue to harness the power of data, the challenge will be to do so in a manner that respects individual privacy and fosters consumer trust.

Breaking the Cycle

In the digital age, the cycle of privacy fears feeding the data machine seems relentless, but it doesn’t have to remain unbroken. Both individuals and enterprises can take strategic steps to regain control over personal data and mitigate the pervasive risks associated with data privacy concerns. First and foremost, transparency is a cornerstone in rebuilding trust and breaking the cycle of data misuse. By clearly communicating how data is collected, used, and shared, organizations can enhance accountability and empower individuals to make informed choices regarding their personal information. This transparency not only promotes credibility but also fosters an environment where privacy concerns are acknowledged and addressed proactively. For enterprises, implementing robust data governance frameworks is crucial. This involves documenting data usage meticulously to ensure accountability and transparency, while model cards and data cards track data provenance and context. Such measures are vital in aligning data practices with human-centered outcomes rather than mere compliance. Furthermore, education plays a pivotal role in disrupting this cycle. By educating employees and the public about data privacy best practices, companies can help safeguard personal information from unauthorized access and breaches. An informed public is better equipped to navigate the complexities of privacy in the digital era, thereby reducing the likelihood of privacy fears escalating into breaches. Additionally, adapting to evolving privacy regulations is essential. A comprehensive understanding of the patchwork of federal, state, and local privacy laws enables organizations to stay compliant and avoid penalties. This includes adhering to sector-specific privacy laws and acknowledging the implications of global legislative developments, such as the General Data Protection Regulation (GDPR), which is widely regarded as a gold standard in data privacy regulation. Ultimately, breaking the cycle requires a collaborative effort from both consumers and businesses. As privacy continues to be a contentious issue worldwide, it is incumbent upon all stakeholders to challenge the status quo, innovate on data protection strategies, and prioritize the security and privacy of individual data. By taking these steps, we can begin to dismantle the data machine’s insidious hold on our privacy.

Neptune RAT Can Destroy Windows PCs, Steal Passwords And Crypto 

Posted in Commentary with tags on April 8, 2025 by itnerd

A dangerous new strain of malware is being used by cybercriminals for infecting susceptible Windows computers in order to steal passwords and cryptocurrency and extort ransom from affected users. The Neptune RAT is being disseminated on social media sites like YouTube, Telegram, and GitHub.

Javvad Malik, Lead Security Awareness Advocate at KnowBe4had this to say: 

“The key takeaway here is that cybersecurity isn’t just an IT problem anymore – it’s everyone’s responsibility. We’re dealing with threats that are widespread, using everything from PowerShell commands to file-sharing services to break into systems. So, what can we do about it?”

“First off, education is crucial. We need to ensure everyone in the organization understands the risks of clicking suspicious links or downloading unknown files, even if they look harmless. It’s about creating a culture of security awareness where people think twice before acting.”

“Secondly, we need to rethink our approach to system access. The principle of least privilege should be the norm, not the exception. If Neptune RAT can’t get admin rights, it can’t do nearly as much damage. Lastly, we need to be proactive, not reactive. Regular security audits, keeping systems updated, and having a solid incident response plan aren’t just good practices – they’re essential defenses.”

“By focusing on education, access control, and proactive measures, we can significantly reduce our vulnerability to these evolving threats. It’s not about perfect security – it’s about making it so difficult for the attackers that they move on to easier targets.”

Paul Bischoff, Consumer Privacy Advocate at Comparitech follows with this: 

“The maker of Neptune RAT is giving their malware out for free, so it’s not just one hacker group we need to worry about. Anyone could use it to launch attacks through email, text, ads, or download links. Once the malware has infected a system, it is extremely destructive, dangerous, and hard to remove. The key is prevention. Don’t click on links or attachments in unsolicited messages, and only download files from trusted sources.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy adds this:

“It appears that the “try it before you buy it” era of malware has arrived. Neptune RAT is available as a download from GitHub, making it available to a wider variety of internet users than usual. As antivirus and anti-malware apps have not yet been able to detect and remove Neptune RAT, internet users will need to stay alert and practice safe computing by not clicking on links or opening attachments that are shared by unknown users.”

I have a suspicion that 2025 is going to be the year where there’s an explosion in increasingly dangerous ransomware. That means that organizations need to do everything possible to avoid being victims. Otherwise 2025 is going to be the year that the pendulum swung in favor of the bad guys.

UPDATE: Ensar Seker, CISO at SOCRadar adds this:

“The emergence of Neptune RAT as a publicly available malware builder, distributed through YouTube, Telegram, and GitHub, is especially dangerous because it lowers the barrier of entry for cybercriminals. We’re not just dealing with a stealthy info-stealer here; this tool combines data exfiltration, system destruction, remote access, and potential ransomware capabilities into a single package. That makes it highly attractive to both amateur hackers and advanced cybercrime groups.”

“What makes Neptune RAT stand out is its distribution model. By offering a ‘free version’ to the public and reserving a more powerful variant behind a paywall, the malware developers are adopting a Ransomware-as-a-Service (RaaS)-style business model, which has proven devastating in recent years. The inclusion of system-wiping functionality is especially concerning, as it shows a shift from simple financial theft toward purely destructive or extortion-based operations.”

“The fact that it’s being distributed openly through mainstream platforms like YouTube and GitHub also highlights a failure in platform moderation and underscores the need for greater threat monitoring on social media and developer repositories.”

“For enterprises and individual users alike, this threat reinforces the need for robust endpoint protection, credential hygiene, and awareness training. Many infections today begin with social engineering, phishing emails, fake downloads, or poisoned links in seemingly trustworthy places like YouTube video descriptions.”

“Finally, defenders need to remain vigilant and leverage threat intelligence platforms to monitor for Neptune RAT’s indicators of compromise (IOCs) and behavior-based detection techniques. Because if the ‘free’ version is already dangerous, we must prepare for the inevitable weaponization of the full version by more advanced actors.”

Fitness Trackers Are Only 67% Accurate: WellnessPulse

Posted in Commentary with tags on April 8, 2025 by itnerd

An original meta-analysis by the WellnessPulse research team reveals that fitness trackers offer moderate overall accuracy (67.40%), but their performance differs by brand and metric. Here’s a breakdown of the findings:

Key findings:

  1. Overall accuracy:
    • Fitness trackers are most accurate for heart rate (76.35%), followed by step count (68.75%) and energy expenditure (56.63%).
    • The Apple Watch leads in accuracy for heart rate (86.31%) and energy expenditure (71.02%), while Garmin excels in step count tracking (82.58%).
  2. Step count accuracy:
    • Garmin (82.58%)Apple (81.07%), and Fitbit (77.29%) show strong accuracy.
    • Jawbone (57.91%) and Polar (53.21%) are less reliable, often mistaking other movements for steps.
  3. Heart rate accuracy:
    • Apple Watch (86.31%) and Fitbit (73.56%) perform well.
    • Garmin (67.73%) and TomTom (67.63%) are less accurate, with reduced precision for darker skin tones due to reliance on light sensors.
  4. Energy expenditure accuracy:
    • Only the Apple Watch (71.02%) provides strong accuracy.
    • Other brands like Fitbit (65.57%)Jawbone (50.23%), and Polar (53.21%) show moderate accuracy, while Garmin (48.05%) is the least accurate.

Methodology

  • Researchers analyzed 45 studies, extracting 168 data points on heart rate, step count, and energy expenditure.
  • Data was compared against gold-standard measurements (e.g., electrocardiograms for heart rate and indirect calorimetry for energy expenditure).
  • A meta-analysis approach was used, with correlation coefficients converted to percentages for clarity.

To see the full report, please visit: https://wellnesspulse.com/research/accuracy-of-fitness-trackers/ 

LinkedIn’s Top Companies for Career Growth in Canada 

Posted in Commentary with tags on April 8, 2025 by itnerd

Today LinkedIn unveiled its 2025 Top Companies list for Canada, spotlighting 50 workplaces that are now hiring big, investing in employee development and fostering long-term career growth. This year, Canada’s financial sector stands out, claiming six of the top ten spots, a reflection of both the industry’s stability and its investment in talent.  These companies are not only hiring across roles in finance, tech, and operations, but also doubling down on reskilling initiatives and internal mobility to help employees grow and pivot. 

Here’s the full list of LinkedIn’s Top Companies in Canada 2025

  1. Scotiabank
  2. TD
  3. Desjardins
  4. CIBC
  5. Thermo Fisher Scientific
  6. Doane Grant Thornton
  7. Autodesk
  8. RBC
  9. Oracle
  10. BMO

These organizations are redefining the future of work by offering employees opportunities to upskill, embrace career mobility, and thrive in innovative environments.

Methodology

Their methodology uses LinkedIn data to rank companies based on eight pillars that have been shown to lead to career progression: ability to advance; skills growth; company stability; external opportunity; company affinity; gender diversity; educational background and employee presence in the country. Ability to advance tracks employee promotions within a company and when they move to a new company, based on standardized job titles. Skills growth looks at how employees across the company are gaining skills while employed at the company, using standardized LinkedIn skills. Company stability tracks attrition over the past year, as well as the percentage of employees that stay at the company at least three years. External opportunity looks at Recruiter outreach across employees at the company, signaling demand for workers coming from these companies. Company affinity, which seeks to measure how supportive a company’s culture is, looks at connection volume on LinkedIn among employees, controlled for company size. Gender diversity measures gender parity within a company and its subsidiaries. Educational background examines the variety of educational attainment among employees, from no degree up to Ph.D. levels, reflecting a commitment to recruiting a wide range of professionals. Finally, employee presence in the country looks at the company’s number of employees in the country relative to other companies, as a means of capturing companies that provide a diverse work environment and more opportunities for career advancement and networking. 

To be eligible, companies must have had at least 500 employees in the country as of Dec. 31, 2024. Attrition can be no higher than 10% over the methodology time period, based on LinkedIn data. Similarly, organizations that have had layoffs of 10% or more of their workforce based on corporate announcements or public, reliable sources between Jan. 1, 2024 and the list launch, are not eligible. These decisions are made by the LinkedIn News team based on company statements and/or reputable news outlets. Only parent companies rank on the list; majority-owned subsidiaries and data about those subsidiaries are incorporated into the parent company score. The methodology time frame is Jan. 1, 2024 through Dec. 31, 2024. This analysis represents the world seen through the lens of LinkedIn data, drawn from the anonymized and aggregated profile information of LinkedIn’s members around the world.

They exclude all staffing and recruiting firms, educational institutions and government agencies. We also exclude LinkedIn, its parent company Microsoft, Microsoft subsidiaries, and Deloitte, which is Microsoft’s independent third-party auditor, from the list.

About company insights

Company insights were sourced from LinkedIn Talent Insights and include the parent company and majority-owned subsidiaries. Data reflects aggregated public member data from active LinkedIn profiles in the relevant country and includes employee profiles associated with the parent company and majority-owned subsidiaries on LinkedIn. We exclude members who identify as interns or contractors. All insights reflect a 12-month time period looking back from January 2025. Top locations were categorized as the regions or cities that employed the largest percentage of each company. Skills data was derived from measuring the most frequent unique skills among a company’s employees, relative to other companies. Most common job titles represent the occupations most common within each company. Largest job function measures the function area most prevalent within each company. Flexible work availability measures jobs flagged as “remote” or “hybrid” by the company or containing similar keywords.

Ricoh introduces first A3 MFPs with straight path scanner

Posted in Commentary with tags on April 8, 2025 by itnerd

 Ricoh USA, Inc. today announced a new lineup of intelligent color A3 multifunction printers (MFPs) with a revolutionary automatic single-pass document feeder (SPDF) that accommodates multiple unique media types, delivering the most flexible feeding capabilities for an office MFP on the market today.

While traditional SPDFs are efficient document management tools, their media handling capacities are limited. Due to a curved path, unique format originals, such as plastic ID cards, can only be scanned on an MFP’s exposure glass, resulting in a tedious and time-consuming process. This can result in downtime for businesses due to the physical sorting and setting of originals, frustrating paper jams, and misalignment of scanned images.

The RICOH IM C3510SDRICOH IM C4510SD and RICOH IM C6010SD(RICOH SD Series) practically eliminates these challenges with a revolutionary production-class straight path SPDF. Incorporating paper transport technology from PFU – a Ricoh Company that manufactures Ricoh document scanners – it dramatically reduces jams while allowing for seamless scanning of mixed originals in a single batch. From thin cash register receipts to fragile thermal or carbonless paper to rigid ID cards, the SPDF on the RICOH SD Series accepts almost anything in its feeder. Users simply place their originals – any size, format, and orientation – in the SPDF and let the MFP do the rest. The RICOH SD Series automatically detects irregularities, and makes orientation and skew adjustments, producing a correctly sized image instantly viewable on the third-generation 10.1” Smart Operation Panel.

Click here to watch a video about the RICOH SD Series’ innovative scanning technology.


A flexible imaging platform

The RICOH SD Series provides all the advanced print, copy and fax features of a modern MFP with flexible and customizable technology that evolves with businesses’ needs. A max print resolution of 1200 x 1200 dpi, and a variety of paper tray and finisher options allow businesses to produce professional quality materials, like brochures, booklets, and presentations in-house. Smart solutions, such as RICOH Smart Integration and RICOH Streamline NX, enable users to personalize their device features, enhance document management and optimize digital workflows, while RICOH CloudStream gives businesses more control of their print infrastructures from the cloud.

Reliable security

Hybrid work has changed the way people collaborate, with information sharing no longer occurring within one location. With flexible and mobile workplaces continually evolving, businesses need assurance that their intellectual property and sensitive data remain secure. The RICOH SD Series incorporates Trusted Platform Module (TPM) version 2.0 encryption as standard, improving the strength of passwords and keys stored on the MFP, and expands the number of admin accounts to reduce the risk of ID sharing. And with RICOH Always Current Technology, businesses can stay ahead of threats with the latest security updates to protect their information and workflows, while also getting access to new features and solutions without having to wait for a technician or purchase a new device.

Advancing sustainability

As an industry leader in sustainability, the RICOH SD Series reflects Ricoh’s long-standing commitment to limiting environmental impacts and supporting sustainable outcomes for businesses worldwide. Designed with 47% post-consumer recycled plastics and using 100% recycled PET toner bottles, the Series’ innovative scanning capabilities promote more digital workflows that reduce paper consumption and waste. An advanced Sleep Mode and a reformulated high-efficiency toner that fuses at a lower temperature also contribute to significantly lower energy usage.

For more information about Ricoh’s print technology, click here.

Cyberattacks are Fewer in Number but Smarter in Strategy, Says CDW Canada Study

Posted in Commentary with tags on April 8, 2025 by itnerd

CDW Canada, today released its annual Canadian Cybersecurity Study, Canadian Cybersecurity Trends: Bridging Strategy, Technology, Artificial Intelligence and Human Expertise, which explores the evolving state of cybersecurity among Canadian organizations. The study, sponsored by CDW Canada and conducted with additional support and analysis by IDC Canada, surveyed over 704 IT security, risk and compliance professionals.

The expanding threat landscape highlights a critical pattern in 2025. Cyberattacks continue to decrease in frequency, yet successful attacks have intensified and become increasingly disruptive. In the past 12 months, 87 percent of Canadian organizations have reported experiencing a security incident, coupled with a 10 percent year-over-year increase in the length of downtime per incident. This pattern indicates a need for Canadian organizations to prioritize proactive cybersecurity to avoid these detrimental disruptions to their business.

GenAI progress stalls amid gaps in security and governance frameworks

Over the past year, organizations have raced to explore the potential of Generative Artificial Intelligence (GenAI), but the excitement has exposed a critical paradox. While organizations recognize GenAI’s transformative potential, many are facing security and compliance barriers that have slowed full-scale adoption.

Canadian organizations are particularly grappling with the complex challenges of securely integrating and scaling GenAI into business operations. Between 2023 and 2024, businesses conducted an average of 17 GenAI proof-of-concepts (PoCs), yet fewer than a third (28 percent) successfully transitioned to full production as concerns over data privacy and compliance put projects on hold.

The majority cite common barriers to adoption, including data privacy concerns (64 percent), skills shortages (57 percent) and system integration complexities (44 percent).

The rush to integrate GenAI has highlighted gaps in Canadian organizations’ foundational frameworks. However, this provides a key opportunity for organizations to strategically assess their data governance and compliance capabilities at a moment when the full potential of GenAI is still in its infancy.

Organizations must invest in strengthening their overall security posture and capabilities to benefit from the transformative potential of GenAI.

Proactive security testing is the missing link for cloud environments

As Canadian organizations expand their digital ecosystems and increasingly rely on their hybrid cloud environments, cyberattackers are keeping pace, exploiting vulnerabilities in cloud environments at an alarming rate. What was once a secondary risk has emerged as a primary concern, with public cloud infrastructures facing more attacks than any other IT infrastructure component.

More than half (61 percent) of Canadian organizations report that their public cloud environments have been the most impacted by cyberattacks. However, organizations conducting annual security testing indicated fewer infiltrations (23 incidents) and breaches (33 incidents) on average compared to 25 and 29 incidents respectively for those without regular testing. This underscores the clear value of comprehensive cloud testing to proactively mitigate risks, freeing up more time and resources for core business operations.

Structural gaps drive the shift toward third-party services

Canadian organizations are prioritizing their security capabilities by investing in Managed Detection and Response (MDR) services, which provide proactive managed solutions to enhance detection and incident response driven by a strategic shift to address internal resource gaps, improve threat detection and response speeds to increase cyber resilience.

Nearly half (41 percent) of Canadian organizations have already adopted MDR services, with more than a third (37 percent) planning to do so in the near future. As organizations continue to struggle with the impacts of breaches, MDR services are a key enabler in reducing vulnerabilities and minimizing operational disruptions.

To learn more about the state of cybersecurity for Canadian organizations, download the study here.

Canadian Marketing Association Leads the Way in AI Adoption With Comprehensive Resources for Marketers

Posted in Commentary with tags on April 8, 2025 by itnerd

The Canadian Marketing Association (CMA) today announced the release of three innovative resources designed to position Canadian marketers at the forefront of AI adoption and implementation. These materials underscore the CMA’s commitment to futureproofing the marketing profession in the rapidly evolving landscape of artificial intelligence (AI).

The “Guide on AI for Marketers,” and “Setting the Stage on Artificial Intelligence: A Primer for Marketers,” were reviewed by the globally renowned Vector Institute, based in Toronto, that empowers researchers, businesses and governments to develop and adopt AI responsibly.

At CMAai, a virtual event taking place on April 10, the CMA will speak to these important resources and unveil key findings from its “Generative AI Readiness Survey,” powered by Twenty44.

The state of AI in marketing

The CMA’s “Generative AI Readiness Survey,” powered by Twenty44 and conducted in October 2024 with 126 CMA members, reveals critical insights into the current state of AI adoption among Canadian marketers:

  • AI usage is on the rise, with 74 per cent of CMA members using generative AI tools at least weekly at work, surpassing the average for Canadian knowledge workers (62 per cent).
  • 84 per cent of members feel positively about integrating AI tools into their daily work tasks.
  • 68 per cent believe AI will make society somewhat or much better, while 83 per cent say it will improve their personal lives.

However, the research also highlights areas for improvement:

  • 44 per cent of members are either unsure if their company has an AI policy or find it lacking.
  • 56 per cent report receiving either no training on AI or ineffective training.
  • 80 per cent report using free or paid personal AI accounts at work.

Strengthening AI knowledge, policies, and security

The CMA’s new resources address the gaps affecting adoption, providing clear guidance on ethical AI usage, practical implementation strategies and best practices for upskilling marketing teams.

The “Guide on AI for Marketers,” provides in-depth insights on key considerations such as:

  • Using personal information in algorithms,
  • AI-driven content creation,
  • Consumer-facing AI applications,
  • Implementing AI influencers, and
  • Best practices for responsible AI use in marketing.

The guide is supported by the “CMA Accountability Checklists for AI in Marketing.” These checklists address a critical challenge in AI governance: the need for clear, role-specific guidance in a landscape where responsibilities often overlap or remain unclear. Our structured framework clearly delineates who is responsible for what in the AI marketing ecosystem. This approach ensures that all participants in the marketing value chain understand their specific obligations and can implement appropriate governance measures.

The resource, “Setting the Stage on Artificial Intelligence: A Primer for Marketers,” offers a comprehensive overview of AI’s impact on marketing, current adoption rates in Canada and global regulatory initiatives. It sets the foundation for marketers to understand and navigate the AI landscape confidently.

These resources affirm the CMA’s position as a leader in supporting the Canadian marketing industry’s growth and adaptation to emerging technologies.

For more information about the CMA’s AI resources, visit https://thecma.ca/resources/compliance-best-practices-guides.

About the survey

The survey methodology was developed by Twenty44 and is powered by Nexxt Intelligence’s AI-driven inca platform. It included a blend of qualitative and quantitative questions and was open between October 2 and October 28, 2024. A total of 126 CMA members participated in the survey.

Today Is Identity Management Day

Posted in Commentary on April 8, 2025 by itnerd

Established in 2021 in partnership with the National Cybersecurity Alliance, Identity Management Day, held on the second Tuesday of April, is a day of awareness to educate business leaders, IT decision makers, and the general public about the importance of identity management.

Wade Ellery, Field CTO, Radiant Logic had this to say about this important day:

     “Today, Identity is the currency in a digital world.  Every digital transaction between customer and a company, between an employee and an application between a bot and a server is grounded in the identity profile and identity data used to authorize those actions. Digital transformation requires the cleanup of a lot of legacy data that did not need to be in digital form.  The anchor for this data is the user identity and it is the place to start when starting to transform any business or operation. The shift of outside attacks from the historic parameter to the vulnerable identities has elevated the criticality of securing identity data both for human and non-human accounts. A new focus on defending identity data and access has reshaped the industry.  Every organization we work with is somewhere on the journey to strengthening their cybersecurity strategy. Where they are today depends on decades of past decisions, IT debt, Identity Data Quality, and recent investments. Regardless of where each company is starting, there are actions they can take today that will incrementally move them down the Identity-First Security road.  These actions will have both immediate benefits and pave the road for future improvements. What most excites me is that as an industry we have stopped telling our customers that identity security or any fundamental security process is a single product or a single project.  By acknowledging the overwhelming scope of the challenge we face in bringing security to the enterprise we can finally start to build solutions that will succeed.  The transition towards a more secure environment is a journey.  This journey will have many parts.  It may look different at the detail level for each organization. But at a higher level it is an incremental progression towards a stronger and more integrated and informed security posture.  At the core of this journey is the clean up, modernization, standardization, and security of identity and identity access.  As the Identity Security market starts to acknowledge the better together concepts of building a complete platform that will continue to involve and improve solutions that can actually finally address the challenge for our customers are possible.”

You can find out more about Identity Management Day here.

Buying Canadian and how advertisers can rise about the fray

Posted in Commentary with tags on April 8, 2025 by itnerd

Since the United States announced 25 per cent tariffs on most Canadian goods, many businesses are pivoting due to consumer pressure, to identify and highlight products made in Canada. According to a recent Leger survey in February 2025, almost 81 per cent of Canadians have significantly increased their spending on Canadian – made products.  

Savvy marketers know to capitalize on movements and through the value of F.A.S.T. (Free Ad Supported Technology) and Roku Canada, brands can optimize their ad dollars without duplication via the power of their home screen. By leveraging Roku’s integrated network, Canadian streamers who were previously “unreachable” can be targeted directly. 

Here’s what Ivan Pehar, Ad Sales Director Roku Canada had to say about that:

Advertisers are already feeling the impact of mounting tariffs with buyer hesitancy and slashed budgets. Marketers need to consider how to maximize their budget to reach their exact audiences through a personalized touch. Roku offers two solutions; directly through the F.A.S.T (Free ad-supported streaming television) network. When clients are paying our partners for ad-free services, you can still reach streamers through Roku’s homescreen. We’ve seen advertisers even leverage a spot in Roku-City to make sure their brand is top of mind.

With 81 per cent of Canadians are looking to spend on Canadian-made products, another effective tool is our use of ACR (automatic content recognition) which allows for a holistic and precise understanding of audience behavior. ACR enables sophisticated targeting, as well as effective retargeting strategies, for precision and optimization at scale. In a time of economic uncertainty, advertisers need to work smarter to reach their targets because every dime counts.”

Now I own a Roku TV and my wife and I have started to see ads from Canadian brands that my wife and I have not heard of before. And some of them we’ll be looking into more. That alone shows that there’s value to this effort by Roku.

WK Kellogg Data Breach Linked to Clop

Posted in Commentary with tags on April 7, 2025 by itnerd

WK Kellogg Co, a US-based food manufacturing company, has reported that company data was stolen during the 2024 data theft attacks against Cleo, a managed file transfer utility targeted by the Clop ransomware gang in late 2024.

Erich Kron, security awareness advocate at KnowBe4, commented:

“Zero day flaws, such as those that have been exploited by the Clop ransomware group, are extremely difficult to defend against. Because these stolen files are HR-related employee files, the information within them is liable to be very sensitive and could easily lead to identity theft for those affected.

“Victims of the data breach should ensure that they have locked their credit to avoid illicit accounts being opened in their names, and should be on the lookout for potential signs of identity theft.”

Another day. Another supply chain attack. That’s not good. Seeing as you’re only as secure as the companies you work with, it’s time to ask those companies some really hard questions to ensure that your company is as safe as possible.