Archive for Canada

Canada’s Cybersecurity Moment of Truth

Posted in Commentary with tags on January 28, 2026 by itnerd

At the NKST IAM Conference in Toronto today, the Canadian Cybersecurity Network released its State of Cybersecurity in Canada 2026 report, signalling a fundamental shift in how cyber risk must be understood nationwide. The report finds that cybersecurity can no longer be viewed solely as a technical issue. It has become a core economic and national stability imperative, with digital trust now underpinning financial systems, public services, and the country’s competitiveness.

The 2026 State of Cybersecurity Report shows Canada facing rising digital risk as AI automation and interconnected systems reshape how attacks occur and how trust breaks down. Cybersecurity is no longer an IT issue. It is a leadership resilience and economic competitiveness challenge that will define how Canada protects critical systems recovers from disruption and maintains confidence in the digital age.

The 2026 findings show that Canada remains resilient, supported by strong talent, world-class research institutions, and a growing cybersecurity ecosystem. However, the report also highlights uneven maturity across the economy, particularly among small and mid-sized organizations, operational technology environments, identity verification practices, and crisis readiness. With attacks increasingly targeting trust, identity, and human decision-making rather than infrastructure alone, these gaps now represent systemic risk.

A central theme of the report is the erosion of traditional trust signals. Deepfakes, voice cloning, and AI driven social engineering now enable attackers to convincingly impersonate executives, employees, and institutions. As identity becomes the most targeted attack surface, purely technical defenses are no longer adequate. Verification must increasingly occur at the moment of action, not after harm has already occurred.

The report also shows that cyber incidents have shifted from isolated security events to full-scale business crises. Regulatory scrutiny, media exposure, and financial fallout now unfold alongside technical response efforts. Yet many organizations remain unprepared to operate under this pressure, even when formal response plans exist on paper.

Another key finding is the growing convergence of cybersecurity, insurance, and governance. Cyber insurers are emerging as active participants in prevention, shaping baseline security expectations and elevating board-level accountability. This dynamic is raising national cyber hygiene standards while exposing maturity gaps that can no longer be ignored.

Looking ahead, the report identifies agentic artificial intelligence and post quantum cryptography as defining forces in the next phase of Canada’s cyber posture. Autonomous systems are accelerating both offensive and defensive activity, compressing decision timelines beyond human response. At the same time, data harvested today may be decrypted in the future if quantum readiness lags.

The cover image of the report reflects this moment. A forward-facing Canadian moose stands alert and resolute, symbolizing a nation that is grounded, strong, and prepared to defend its systems, economy, and public trust in an increasingly contested digital environment.

Alongside the national report, the Canadian Cybersecurity Network is launching CCN Insights, a new intelligence series focused on emerging risks shaping digital trust. The first release, When AI Acts: Securing Autonomous Systems at Machine Speed, examines how autonomous AI, deepfakes, and synthetic identity are redefining enterprise risk. It is being unveiled this week at the IAM Conference.

State of Cybersecurity in Canada 2026 is designed to provide boards, executives, policymakers, and security leaders with a clear assessment of where Canada stands today, and the priority actions required to strengthen national resilience in the years ahead. Get the report here.

Warning from Canadian Centre for Cyber Security says that critical infrastructure is vulnerable

Posted in Commentary with tags on November 6, 2025 by itnerd

Late last week, the Canadian Centre for Cyber Security shared a warning stating that hacktivists are targeting critical infrastructure through internet-exposed industrial control systems (ICS).

In recent weeks, the Cyber Centre and the Royal Canadian Mounted Police have received multiple reports of incidents involving internet-accessible ICS. One incident affected a water facility, tampering with water pressure values and resulting in degraded service for its community. Another involved a Canadian oil and gas company, where an Automated Tank Gauge (ATG) was manipulated, triggering false alarms. A third one involved a grain drying silo on a Canadian farm, where temperature and humidity levels were manipulated, resulting in potentially unsafe conditions if not caught on time.

While individual organizations may not be direct targets of adversaries, they may become victims of opportunity as hacktivists are increasingly exploiting internet-accessible ICS devices to gain media attention, discredit organizations, and undermine Canada’s reputation.

Exposed ICS components, including Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Human-Machine Interfaces (HMIs), Supervisory Control and Data Acquisition (SCADA) systems, Safety Instrumented Systems (SIS), Building Management Systems (BMS), and Industrial Internet of Things (IIoT) devices, pose significant risks to organizations, their clients, and the broader Canadian public.

 Grayson Milbourne, Security Intelligence Director, OpenText Cybersecurity had this to say:

“The Cyber Centre’s alert underscores a cross-border reality: both Canadian and U.S. critical infrastructure operators are connecting legacy industrial control systems to the internet without the right access safeguards. These systems weren’t designed with modern authentication in mind, and that’s exactly where attackers are getting in.

Cybersecurity for critical infrastructure has to start with identity. When every user, device, and connection is verified, organizations can limit who touches sensitive systems and quickly spot when something’s wrong. That means implementing strong identity and access management, continuous monitoring, and strict network segmentation to close the gaps hacktivists exploit.”

This warning illustrates the fact that critical infrastructure needs to move to a place where it isn’t a target for threat actors. Right now critical infrastructure is low hanging fruit for threat actors. And that isn’t a good place to be as it can have catastrophic results for all of us.

1 in 3 Canadian organizations hit by Ransomware, but only 25% fully recover

Posted in Commentary with tags , on October 23, 2025 by itnerd

 OpenText today released the findings of its fourth annual Global Ransomware Survey. The survey of almost 1,800 security practitioners and business leaders highlighted a rising tension between confidence and risk: confidence in ransomware readiness is rising yet concern over AI-driven attacks and third-party vulnerabilities are growing just as fast.

Organizations believe they’re ready to bounce back from ransomware — but AI is rapidly changing the threat landscape. New attack methods, weak governance, and supply chain vulnerabilities are exposing critical gaps between preparation and performance, creating a higher-stakes environment for defenders and leaders alike. This is especially true for SMBs that have fewer formal AI policies. 

Key survey findings include:

False Sense of Confidence Grows, as AI Raises the Stakes
Organizations feel more prepared than ever to recover from ransomware attacks, but AI introduces a growing layer of complexity that’s causing unease. While internal GenAI use is rising, so are external AI-powered threats. Organizations are navigating a high-stake balancing act to enable innovation while managing risk.

  • Ninety-four percent of Canadian respondents are confident in their ability to recover from a ransomware attack, but only 25% of those attacked fully recovered their data.
  • Eighty-two percent allow employees to use GenAI tools, yet less than half (40%) have a formal AI use policy fully implemented.
  • Thirty-nine percent report increased phishing or ransomware due to AI; 30% have seen deepfake-style impersonation attempts.
  • Top AI-related concerns among Canadian respondents include data leakage (30%), AI-enabled attacks (25%), and deepfakes (14%).

Unmanaged Supply Chain Pathways Create Hidden Risks
While much of the ransomware conversation centers on AI, supply chain and third-party risks remain a quiet but dangerous threat. Attacks are both more frequent and distributed, often entering through vendors, partners, or unmanaged digital pathways.

  • One in three Canadian companies (31%) experienced a ransomware attack in the past year; nearly half of those (48%) were hit more than once.
  • Thirty-two percent of Canadian victims paid a ransom; 21% paid $250K or more.
  • Only 25% of those hit fully recovered their data; 3% recovered nothing.
  • Eleven percent experienced ransomware attacks originating from a software vendor.
  • Over two-thirds (67%) of Canadian organizations now assess software supplier cybersecurity; 75% have patch management in place.

Sophistication of Ransomware Attacks Raises Awareness
The rise of AI and the spread of ransomware across critical business systems have pushed cybersecurity into the spotlight. What was once seen as an IT issue is now recognized as a core strategic concern for boards and executive teams.

  • Sixty percent of Canadian respondents say their executive team sees ransomware as a top three business risk.
  • Nearly half (48%) have been asked by customers or partners about ransomware readiness in the past year.
  • 2026 investment priorities include network protection (54%), cloud security (53%), and backup technologies (48%).
  • A majority (64%) conduct regular security awareness training; 11% offer none.

For additional findings from the OpenText Cybersecurity 2025 Global Ransomware survey, view the infographic.

Protecting against ransomware now depends not just on internal defenses, but also on how effectively organizations, partners, and technology providers work together to close security gaps before they’re exploited. To learn more about their enterprise solutions, explore OpenText Cybersecurity Cloud. To learn more about their offerings for SMBs, click here.

Survey Methodology

In September 2025, OpenText Cybersecurity surveyed 1,773 C-level executives, security professionals, and security and technical directors from SMBs and enterprises in the United States, Canada, the United Kingdom, Australia, France, and Germany. Respondents represented multiple industries, including technology, financial services, retail, manufacturing, healthcare, education, and more.

Canada’s House Of Commons Has Apparently Been Pwned

Posted in Commentary with tags , on August 14, 2025 by itnerd

Bleeping Computer is reporting that Canada’s House of Commons is investigating an employee data breach after a cyberattack

While the lower house of the Parliament of Canada has yet to issue a public statement regarding this incident, CBC News reports that House of Commons staff were notified of a breach on Monday via email.

The alert states that the attacker exploited a recent Microsoft vulnerability to gain access to a database containing sensitive information used to manage House of Commons computers and mobile devices. During the breach, the threat actor also stole some employee data that isn’t publicly available, including their names, job titles, office locations, and email addresses.

Employees and House of Commons members were also urged to be aware of potential fraudulent attempts to use the information stolen during the attack, which could be used to target and impersonate parliamentarians or exploited in scams.

The House of Commons is now collaborating with the country’s Communications Security Establishment (CSE), the national security agency, to investigate the impact of the attack

Javvad Malik, Lead Security Awareness Advocate at KnowBe4 had this comment: 

“While details of how the breach occurred and who was behind it is limited for now. The stolen data can be weaponized for tailored phishing and impersonation against officials. Staff will likely receive convincing emails, texts, and calls leveraging the job and device details that have been stolen. Priority should be given to provide clear guidance and strict verification for requests along with a strong reporting culture so that people can work together to help secure the organization.”

Chris Hauk, Consumer Privacy Champion at Pixel Privacy adds this comment:

“There has been a big increase in the number of cyber incidents over the last few years, and targets like the House of Commons have proven to be attractive, data rich targets for both criminal and state-sponsored hackers. Employees and members of the House of Commons need to be on alert for phishing schemes that use the data gleaned from this hack to gain access to additional personal and financial information from those affected by the leak.”

We’ll eventually find out what happened here. But it shows how important that applying patches is seeing as a Microsoft vulnerability was apparently responsible for the threat actors being able to get in. Thus now might be a very good time for you to patch all the things.

An Unnamed Canadian Telco Was Pwned By Chinese Hackers

Posted in Commentary with tags , on June 24, 2025 by itnerd

The Canadian Centre for Cyber Security and the FBI in the U.S. have put out statements that both state that a unnamed Canadian telco has apparently been pwned by Chinese hackers:

The Cyber Centre is aware of malicious cyber activities currently targeting Canadian telecommunications companies. The responsible actors are almost certainly PRC state-sponsored actors, specifically Salt Typhoon.

Three network devices registered to a Canadian telecommunications company were compromised by likely Salt Typhoon actors in mid-February 2025. The actors exploited CVE-2023-20198 to retrieve the running configuration files from all three devices and modified at least one of the files to configure a GRE tunnel, enabling traffic collection from the network.

In separate investigations, the Cyber Centre has found overlaps with malicious indicators associated with Salt Typhoon, reported by our partners and through industry reporting, which suggests that this targeting is broader than just the telecommunications sector. Targeting of Canadian devices may allow the threat actors to collect information from the victim’s internal network, or use the victim’s device to enable the compromise  of further victims. In some cases, we assess that the threat actors’ activities were very likely limited to network reconnaissance .

While our understanding of this activity continues to evolve, we assess that PRC cyber actors will almost certainly continue to target Canadian organizations as part of this espionage campaign, including telecommunications service providers and their clients, over the next two years. To monitor and mitigate this threat, we encourage Canadian organizations to consult the guidance linked below on hardening networks, security considerations for edge devices, and additional cyber threat information pertaining to the PRC.

So in short, China is has hacked this Canadian telco to snoop on traffic since February 2025. I assume that includes things like text messages and calls, not to mention unencrypted data. That’s not good to say the least. Now I for one would like to know which telco got pwned. And I also would like to know what that telco, along with every other telco in Canada is going to do to ensure that this stops here. Canadians deserve to know that their telcos are doing everything possible to keep their communications safe. So how about it Bell, Rogers, TELUS and Quebecor? Will you do your part to reassure Canadians that this stops here?

BREAKING: Massive Outage Takes Out Numerous ISPs And Apps In Canada [UPDATE: Resolved]

Posted in Commentary with tags on May 21, 2025 by itnerd

About 45 minutes ago I started getting calls from numerous clients about not being able to get email or surf the Internet. On top of that my wife texted me to say that our Internet was out. I knew that wasn’t a good sign and a quick look at Down Detector confirmed what I was thinking:

Clearly numerous ISP’s including Rogers, Cogeco, Bell, Ebox, and Distributel have issues at the moment. On top of that, I note that Scotiabank is down as well. From what I can tell this outage covers the Greater Toronto Area and beyond. And clearly Bell and related companies are affect more than others. I’ll be keeping an eye on this as clearly this is very serious and wide spread.

UPDATE: This outage apparently covers Ontario and Quebec. So this is big.

UPDATE #2: This outage seems to be resolved as of roughly 10AM EST.

Here’s Today’s App That Helps You To Buy Canadian

Posted in Commentary with tags on March 3, 2025 by itnerd

With the threat of Trump dropping his ill advised tariffs on Canada coming at any time, I’ve been highlighting ways that you can find out if the products that you buy are Canadian or supports Canadian businesses.

Today’s app that will help you with that is called Check The Label. The developers have an app for iOS and Android, as well as an option that allows you to use the camera in your computer to point a barcode at the camera in order to scan it. Then you’ll get information as to where the product was made. Personally, the smartphone app is the way to go as you always have your smartphone on you, which means you can be in a grocery store and use it to make the correct purchasing decisions. Which are ones that avoid US products and the tariffs that come with them.

If you have any other apps that you’ve used to shop smarter, post a comment and let me know and I will share them with everyone.

Here’s An App That Will Help You To Buy Canadian

Posted in Commentary with tags on February 23, 2025 by itnerd

After posting a story about this browser extension, I’ve had a reader tip me off to Maple Scan. This is an app that when you use it to scan a product using your camera, it will tell you if the product is Canadian or supports Canadian businesses. But it also does more:

  • If a product isn’t fully Canadian, it will suggest local alternatives.
  • It will tell you if imported products include Trumps stupid tariffs or some other special tax.

The app is available for iOS and Android. Though the latter is currently being beta tested. I tested this on my iPhone 14 Pro with several products from coca powder to pens. And while it does take about a minute to come back with results, it does what it says it will do. So if you’re a proud Canadian who wants to support Canadian businesses, there’s now an app for that.

Canada’s Plan To Phase Out Gas Powered Cars By 2035 Is Unworkable… Here’s Why

Posted in Commentary with tags , on March 27, 2024 by itnerd

Last December, the Canadian Government announced a plan to phase out gas powered cars by 2035. In short, what the Canadian Government wants is to have all of us driving zero emission vehicles (which is another way of saying electric vehicles) by that point or shortly after that point. This is an attempt to reduce emissions and allow Canada to hit their climate change goals. Now to be clear, I am all for making the environment better and reducing the effects of climate change. But this plan to shift drivers to electric vehicles is not workable for a number of reasons.

Let’s start with the fact that a robust and easily accessible charging infrastructure doesn’t exist. While some homeowners who own electric vehicles have level 2 chargers at home, there are a lot who don’t or can’t do so. Yours truly for example lives in a condo that doesn’t have any charging infrastructure whatsoever. And that’s the same for those in apartments as well. And many building management companies aren’t willing to budge on that. So what that means is if I want to charge an electric vehicle, it may be a challenge as illustrated by this search that I did on Apple Maps:

You’ll see a lot of big green dots and smaller green dots indicating where a EV charger is located. Compare that to simply searching for gas stations:

There’s a lot more blue dots (gas stations) that are big and small versus green dots (EV chargers) big and small. That means many people will find it a challenge at best to charge an electric vehicle. And that will hamper the sales of electric vehicles because humans will only adopt something if it is as easy or easier than whatever it is replacing. And right now if someone can’t just pop out to a charger that’s a five minute drive down the road and get a charge that gets their car to at least 80% in well under an hour, they’re not going to get an electric vehicle.

That brings me to my next point, electric vehicles are too expensive. Anyone that I know who has an electric vehicle is also someone who is willing and able to spend luxury car money on a gas vehicle. Even the cheapest electric vehicles out there are out of the price range of the average consumer who typically buys a Honda Civic or something in that price range. And that factors in government rebates for buying or leasing an electric vehicle. Now I get why this is the case. Car companies aren’t selling them in high enough volume to enable them to bring the price of these vehicles down to affordable levels. In fact, some companies have shifted away from producing more electric vehicles to producing more hybrids as those are actually selling. Until that changes, the needle on electric vehicle sales is going to move very slowly.

Sidebar: You should take Tesla out of the mix when it comes to companies who are shifting to making more hybrids as all Tesla makes are electric vehicles. Thus they have economies of scale working for them. Unlike every other car company that makes electric vehicles.

The next point that I’d like to bring up is the range of these vehicles. My 2016 Hyundai Tucson gets about 600KM on a single tank of gas. Sometimes more if I drive in a more “subdued” manner. That’s important as buyers like me who want to drive electric vehicles want to get a similar range relative to we get now with. a gas powered vehicle. In fact a KPMG study revealed that 80 per cent of Canadians wouldn’t “consider buying an EV unless it has a minimum 400 km range fully charged.” The problem is that many electric vehicles don’t get that range. Part of that is due to the fact that Canada is very cold for six months of the year. And cold weather has a negative effect on electric vehicles. Part of that is that you get reduced range in cold weather. Some people say about 30% less range. But there’s also the fact that the car might not work at all if it is too cold. I cite this example where many Tesla cars in Chicago wouldn’t work because it was too cold. Another somewhat related factor is that the range that an auto maker gives is often in “ideal” conditions. And none of us drive in “ideal” conditions because those “ideal” conditions are in a lab or a test track. Which is another way of saying that you’re going to be unlikely to see the range that the auto maker says you should get. Thus this is something that needs to be sorted before electric vehicles get adopted broadly.

Finally, there’s reliability. Electric vehicles generally are reliable than gas powered cars and this Consumers Reports article goes into the weeds on that. But let me cut to the chase here. Nobody is going to move to technology that is less reliable than what they have now. And that lack of reliability will slow electric vehicle adoption.

All of this makes Canada’s plan to move to zero emission vehicles by 2035 a non starter in my mind. I honestly would love to be proven wrong on this. But as things stand right now, I don’t think so. The only way I might be proven wrong on this is if there’s a major course correction to make electric vehicles more affordable, more reliable, improve the charging infrastructure, and make the range more in line with gas powered cars. This is something that all parties in this space, meaning government and the car industry need to tackle. And they need to start doing that today if meeting that 2035 deadline is to be achieved.

Do you agree with me? Do you disagree with me? Leave a comment below and share your thoughts.

Canadian Government Wants To Ban The Flipper Zero To Stop Car Thefts… This Isn’t The Solution To This Problem

Posted in Commentary with tags on February 11, 2024 by itnerd

Car theft in many parts of Canada are completely out of control. And to combat this, The Canadian Government has come out with the bright idea of banning the tools that thieves use to steal cars. That includes the Flipper Zero which is a penetration testing tool that has been around for years. It uses  multiple protocols, including RFID, radio, NFC, infrared, and Bluetooth to allow someone to debug hardware or do penetration testing. According to the Canadian Government, this tool is the cause for the surge in car thefts.

You can see here that Flipper Zero isn’t happy with this decision. But the thing is that from my research, I can find lots of ways that a Flipper Zero can be used to steal cars. And I think tools like this are a problem and need some degree of regulation. But there are other ways of stealing cars. Carjackings have become commonplace here in Toronto. Take this example, or this example. Both in the last week. Then there’s the trend of home invasions where criminals break into homes and terrorize residents to steal cars. Such as this recent example. I suspect that carjackings and home invasions have become more prevalent because the preferred method of stealing cars which is a relay attack is becoming less and less effective because of car owners are putting their car key fobs in Faraday cages and keeping them in areas of their homes that make relay attacks less possible. Plus there’s the fact that car companies who are aware of this trend are trying to make their cars harder to steal. Because being known as a car brand that has a theft problem is bad for business. Just ask Hyundai and Kia who have a huge problem with thefts related to “The Kia Boyz” TikTok trend.

Any solution for car theft in Canada needs to be more than just banning stuff. Sure, regulate the tech that is behind these thefts. But carjackings and home invasions are issues that are solved by other means. Like longer jail sentences for example. And there’s the fact that it is disgustingly easy for car thieves to export cars from Canada via Canada’s ports. Something that the Canadian Government kind of admitted and has finally decided to do something about. Fact is that there’s no one solution to this problem, and those in charge here in Canada need to figure that out and take action that means something rather than just picking on tech and calling it a day.