<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Avasek</title>
	<atom:link href="https://avasek.ca/feed/" rel="self" type="application/rss+xml" />
	<link>https://avasek.ca/</link>
	<description></description>
	<lastBuildDate>Mon, 13 Feb 2023 16:48:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://avasek.ca/wp-content/uploads/2022/04/cropped-favicon-32x32.png</url>
	<title>Avasek</title>
	<link>https://avasek.ca/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Top Causes of Cyberattacks in 2022— according to Incident Response Professionals</title>
		<link>https://avasek.ca/the-top-causes-of-cyberattacks-in-2022-according-to-incident-response-professionals/</link>
					<comments>https://avasek.ca/the-top-causes-of-cyberattacks-in-2022-according-to-incident-response-professionals/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Mon, 13 Feb 2023 11:47:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[incident response]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=920</guid>

					<description><![CDATA[<p>Incident response professionals share the top causes of cyberattacks in 2022— including insights on how you can help keep your company and employees secure moving forward. </p>
<p>The post <a href="https://avasek.ca/the-top-causes-of-cyberattacks-in-2022-according-to-incident-response-professionals/">The Top Causes of Cyberattacks in 2022— according to Incident Response Professionals</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Written by Traci Hamilton, Senior Security Consultant at Avasek</em></p>



<p></p>



<p>2022 was another busy year for our Incident Response team. Whether it was responding to a breach onsite, or remote restoration, there were some consistencies we found as to how threat actors were able to get in. Here are our findings for what we saw most in 2022.&nbsp;</p>



<p>Matt Pippin, Director of Incident Response, says the top two causes for compromise in 2022 were not patching or updating systems as well as a lack of user education. Let&#8217;s break it down.</p>



<h2 class="wp-block-heading"><strong>Patch Management&nbsp;</strong></h2>



<p>Patch Management is an important part of systems management and involves monitoring systems for updates and installing patches that may change features, correct bugs, and most importantly, fix critical security vulnerabilities.&nbsp;</p>



<p>Pippin says, &#8220;We see servers running Server 2008-2016 that are online and not patched.&#8221; Some IT teams may hold off on installing patches and test them to ensure they don&#8217;t disrupt critical systems within their environment, but as Pippin emphasizes, not patching systems is usually &#8220;due to a lack of IT resources.&#8221; In our review of 2022, there were three distinct areas of compromise for unpatched systems.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Areas of Compromise for Unpatched Systems&nbsp;</strong></h2>



<p>Apache Log4j vulnerability, also known as Log4Shell, is a vulnerability on the Apache Log4j 2 Java Library. It is a Remote Code Execution (RCE) vulnerability that&#8217;s been given a threat rating of CVSS-10, which is considered the most critical and rarely assigned to a vulnerability. It is also the top compromise Avasek&#8217;s Incident Response Team saw in 2022. Does that mean all Log4j compromises were on unpatched systems? Not necessarily. Four patches have been released since the discovery of the Log4j vulnerability, two of which had vulnerabilities of their own. So, what can businesses and IT teams do to protect themselves from this ongoing, critical security vulnerability?&nbsp;</p>



<p>&#8220;For any system that has the Log4j vulnerability, remove its exposure to the internet,” says Pippin. “If that&#8217;s not possible then limit traffic to it from only known and verified good sources. Outside of those things, putting MFA for logins on the system as well as isolation from the main production network will help as well. There are other things that can be done depending on what the system is used for but getting an Avasek Security Assessment would help determine other avenues of protection.&#8221;&nbsp;</p>



<p>George Zilahi, Director of Managed Services, adds, &#8220;Make sure Remote Desktop Protocol (RDP) is not publicly accessible. It should only be behind a VPN or inside the network. Vulnerability assessments should also be done regularly.&#8221; This leads us to the other top two areas of compromise we saw in 2022 for unpatched and updated systems: Exchange servers and firewalls. Even if IT resources are minimal, keeping an eye out for critical system patches and updates, and most importantly installing them, can help reduce your company&#8217;s chance of compromise.&nbsp;</p>



<h2 class="wp-block-heading"><strong>User Error Can Leave Your Organization Vulnerable</strong>&nbsp;</h2>



<p>Now let&#8217;s turn to the other top cause of compromise we saw in 2022, which is lack of user education. More specifically, lack of security awareness education. Phishing, as defined by NIST, is &#8220;A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.&#8221; But not all phishing attacks are the same, and from what Avasek&#8217;s Incident Response team saw in 2022, spear phishing attacks took the top spot.</p>



<p>You might be asking, “What&#8217;s the difference between phishing and spear phishing?” Phishing broadly describes an attack that&#8217;s designed to get someone to take action, like clicking a link in a mass spam email. Spear phishing is simply a targeted phishing attack. The cybercriminal, for example, may be looking for specific information that only one or two individuals at an organization have. They then use techniques like social engineering to gain that individual’s trust to get the desired information, which in turn, is used to execute the cyberattack.&nbsp;</p>



<p>It should come as no surprise to anyone that phishing attacks are not going away anytime soon. In fact, they’re increasing day-by-day. Messaging security company, SlashNext, conducted a study analyzing &#8220;billions of link-based URLs, attachments, and natural language messages in email, mobile and browser channels over six months in 2022 and found more than 255 million attacks – a 61% increase in the rate of phishing attacks compared to 2021.&#8221; Additionally, global technology company, Acronis, says that the average cost per data breach could reach more than $5 million in 2023.&nbsp;</p>



<p>Educating your employees on security awareness and what to watch out for is a vital step in protecting your company from these types of attacks. Training company, KnowB4, notes that, &#8220;Old-school awareness training does not work anymore, and email filters have an average 7-10% failure rate.&#8221; Regular monthly simulated phishing attacks, in addition to continued education, can help dramatically reduce a company’s phishing risk.&nbsp;</p>



<h2 class="wp-block-heading"><strong>Final Thoughts</strong></h2>



<p>While this is not an all-inclusive list of every top compromise in 2022, we thought it best to share what our team saw most over the past year, along with some insights to help you, your company, and employees stay secure. </p>



<p><a href="https://avasek.ca/contact/">Contact us</a> for more information on a security assessment or to learn how Avasek can help protect your organization.</p>



<p></p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/the-top-causes-of-cyberattacks-in-2022-according-to-incident-response-professionals/">The Top Causes of Cyberattacks in 2022— according to Incident Response Professionals</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/the-top-causes-of-cyberattacks-in-2022-according-to-incident-response-professionals/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>SaaS Protection with 1-Click Backup: How to Safeguard your Business from Data Loss</title>
		<link>https://avasek.ca/saas-protection-with-1-click-backup-how-to-safeguard-your-business-from-data-loss/</link>
					<comments>https://avasek.ca/saas-protection-with-1-click-backup-how-to-safeguard-your-business-from-data-loss/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 23:02:03 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=856</guid>

					<description><![CDATA[<p>Cloud-connected SaaS tools such as Google Workspace and Microsoft 365 have transformed the modern workplace, providing companies with the flexibility of always-online systems. And while such systems are robust, they’re not foolproof. Just as on-premise machines can be vectors for cyberattacks or suffer system crashes, information held on SaaS tools can also be corrupted, lost, or stolen.</p>
<p>With this in mind, here’s what you need to know about protecting your organization when it comes to SaaS platforms.</p>
<p>The post <a href="https://avasek.ca/saas-protection-with-1-click-backup-how-to-safeguard-your-business-from-data-loss/">SaaS Protection with 1-Click Backup: How to Safeguard your Business from Data Loss</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cloud-connected SaaS tools such as Google Workspace and Microsoft 365 have transformed the modern workplace, providing companies with the flexibility of always-online systems. And while such systems are robust, they’re not foolproof. Just as on-premise machines can be <a href="https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/" target="_blank" rel="noreferrer noopener">vectors for cyberattacks</a> or suffer system crashes, information held on SaaS tools can also be corrupted, lost, or stolen.</p>



<p>With this in mind, here’s what you need to know about protecting your organization when it comes to SaaS platforms.</p>



<h2 class="wp-block-heading">Understanding the Shared Responsibility Model</h2>



<p>Perhaps the most important thing to remember when using SaaS tools is that many providers operate on the Shared Responsibility Model (SRM). As the name suggests, SRM puts an onus on both the software provider and the end-user to maintain good security and robust data handling practices.</p>



<p>An example of SRM in action would be Google scanning a file for known vulnerabilities as it is uploaded to a company’s Google Drive folder by a Workplace user. When that file is later downloaded by another user, Google may check it again for malicious code, but it is also the responsibility of a company to run its own security examination, making sure the file is safe to run on its network.</p>



<p>Likewise, a company is responsible for how Microsoft 365 interfaces with other tools it uses. Incompatibility issues that could threaten the integrity of key files or programs should therefore be reported back to the SaaS provider so that those issues may be addressed.</p>



<p>While SRM is a good practice in the world of SaaS tools, errors will inevitably occur. According to a survey by the Cloud Security Alliance, <a href="https://www.securitymagazine.com/articles/97459-saas-misconfigurations-lead-to-cybersecurity-incidents" target="_blank" rel="noreferrer noopener">43% of organizations have experienced at least one security incident or malfunction</a> linked to SaaS misconfiguration.&nbsp;</p>



<h2 class="wp-block-heading">Ransomware attacks are on the rise</h2>



<p>Even in the most rigorously maintained SaaS environments, security lapses happen. It only takes one employee to mistakenly click a link from a spoofed email address, and before they realize it, <a href="https://avasek.ca/2016-02-ransomware/" target="_blank" rel="noreferrer noopener">ransomware</a> is spreading like wildfire throughout the company, locking up vital data.</p>



<p>Profit-driven malicious attacks are a big business for the bad guys. As reported by InfoSecurity, <a href="https://www.infosecurity-magazine.com/news/ransomware-exceed-30bn-dollars-2023/" target="_blank" rel="noreferrer noopener">ransomware attacks are on track to cost global businesses more than $30 billion in 2022</a>, with some expecting that figure <a href="https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-250-billion-usd-by-2031/" target="_blank" rel="noreferrer noopener">to climb as high as $265 billion by 2031</a>. With more and more SaaS platforms making their way into organizations, the surface area for ransomware attacks is growing exponentially.</p>



<h2 class="wp-block-heading">Accidental file deletion is a frequent problem</h2>



<p>Theft is not the only threat to information hosted on SaaS platforms; user error is also a major risk. Both Google Workspace and Microsoft 365 have data retention settings, allowing administrators a level of control over the time that files are held on cloud-based servers. But should those rules be misaligned, then important data can be scrubbed.</p>



<p>A <a href="https://blogs.perficient.com/2016/03/24/user-error-is-primary-cause-of-saas-data-loss-survey-says/" target="_blank" rel="noreferrer noopener">2016 questionnaire</a> of over 1,000 IT professionals in the U.S. and the U.K. found inadvertent deletion was the principal cause of data loss on SaaS networks. The study &#8211; carried out by EMC’s Spanning &#8211;&nbsp; also found many companies mistakenly believed SaaS providers are primarily responsible for recovering data lost by users. Once again, SRM plays a significant role in data management.</p>



<h2 class="wp-block-heading">Avasek SaaS Protection provides a 1-click backup solution</h2>



<p>The most important aspect of any data recovery planning is to make sure you have adequately backed up your information before anything bad can happen. This is why Avasek has partnered with widely-trusted data backup operator Datto to provide institutions with a backup and recovery solution that works inside of Google Workspace and Microsoft 365.</p>



<p>For a low cost per license, Avasek’s SaaS Protection automatically backs up files three times a day, ensuring you always have a fresh copy of your important data. Avasek’s flexible data retention rules allow you to decide what is kept and for how long. And should the worst happen, our 1-click recovery solution ensures you can get information back, all in a non-destructive manner.</p>



<p>So whether it&#8217;s emails to your customers, or spreadsheets from your clients, Avasek&#8217;s SaaS Protection is always backing up your information, making sure it’s only a click away should the worst happen. </p>



<div style="height:32px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>Protect your SaaS data with 1-click. </h2>
              <div class="cf-intro">Data recovery planning is critical to protect your company from data loss. Avasek&#8217;s SaaS Protection service ensures that cloud-hosted information within Microsoft 365 or Google Workspace is adequately backed up and one click away, should the worst happen. Contact our team to learn more. </div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/saas-protection-with-1-click-backup-how-to-safeguard-your-business-from-data-loss/">SaaS Protection with 1-Click Backup: How to Safeguard your Business from Data Loss</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/saas-protection-with-1-click-backup-how-to-safeguard-your-business-from-data-loss/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is your organization’s data protected from potential cybersecurity threats?</title>
		<link>https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/</link>
					<comments>https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Sat, 01 Oct 2022 15:00:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[education]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=762</guid>

					<description><![CDATA[<p>October is National Cybersecurity Awareness Month, so read on to educate yourself about the importance of internet safety. </p>
<p>The post <a href="https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/">Is your organization’s data protected from potential cybersecurity threats?</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Since 2004, cybersecurity professionals have dubbed <a href="https://www.cisa.gov/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,confidential%20data%20become%20more%20commonplace." target="_blank" rel="noreferrer noopener">October National Cybersecurity Awareness Month</a> to educate individuals and organizations about the importance of internet safety.&nbsp;</p>



<p>This year&#8217;s theme is &#8220;It&#8217;s easy to stay safe online,&#8221; which reminds users that there are plenty of simple ways to protect your personal information and secure private data when using the internet.&nbsp;</p>



<h2 class="wp-block-heading"><strong>What is cybersecurity, and why is it important?</strong></h2>



<p>Cybersecurity is the practice of safeguarding and restoring data from devices, programs, or networks. Cybercriminals can steal all sorts of data, including, but not limited to: health records, personal data, or intellectual property.&nbsp;</p>



<p>In a digital age, we have significantly increased our use of tech and cloud-based services, which means our data is now at greater risk of being hacked now more than ever. Now more than ever, be aware of what information you share with others and how that information is distributed.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="536" src="https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats-1024x536.jpg" alt="$22,184 Per Minute Average Ransomware Cost - 50% Increase in Cyberattacks Last Year - 244 Recent Publicized Ransomware Attacks - $20B Estimated Annual Ransomware Cost" class="wp-image-770" srcset="https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats-1024x536.jpg 1024w, https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats-300x157.jpg 300w, https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats-768x402.jpg 768w, https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats-800x419.jpg 800w, https://avasek.ca/wp-content/uploads/2022/09/Avasek-CybersecurityStats-Blog_v2_cybersecurity-101-stats.jpg 1201w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2 class="wp-block-heading"><strong>What are the most common cybersecurity threats?</strong></h2>



<p>Potential risks to cybersecurity come in a wide variety of forms. If you don&#8217;t employ the greatest cybersecurity measures, each of these dangers has the potential to result in a data breach.</p>



<p><strong>Lack of attention to cybersecurity can harm your organization in a variety of ways, such as:</strong></p>



<ul class="wp-block-list"><li><strong>Ransomware:</strong> Is a kind of malware that restricts users&#8217; access to their computer systems or personal files and demands ransom money to allow users to access again.</li></ul>



<ul class="wp-block-list"><li><strong>Malware:</strong> Malware is software created explicitly to interfere with, harm, or gain unauthorized access to a computer system.</li></ul>



<ul class="wp-block-list"><li><strong>Denial of service:</strong> A Denial-of-Service (DoS) attack aims to bring down a computer system or network so its intended users cannot access it. DoS attacks do this by providing information that causes crashes or flooding the target with traffic.</li></ul>



<ul class="wp-block-list"><li><strong>Phishing:&nbsp; </strong>Hackers employ this method to send phony emails or messages that seem to be from a reliable source. Cybercriminals can create these messages or emails by impersonating individuals you know, such as friends, coworkers, or other reputable businesses.&nbsp;</li></ul>



<h2 class="wp-block-heading"><strong>How can you defend your business against cybercrime?</strong></h2>



<p>You can boost security and lower the danger of cybercrime by implementing the following practices within your organization:</p>



<ul class="wp-block-list"><li><strong>Educate your staff </strong>&#8211; Inform your staff members of good cybersecurity practices when creating platforms for work resources, including company emails, computer logins, or data transfers within your organization.&nbsp;</li></ul>



<ul class="wp-block-list"><li><strong>Secure your devices &#8211; </strong>Your company&#8217;s information and valuable data might be at risk for possible data breaches if your company devices are left unattended, misplaced, or stolen.&nbsp;</li></ul>



<ul class="wp-block-list"><li><strong>Update your devices regularly &#8211; </strong>Always check to ensure that your devices have the latest software when prompted to make the updates when the updates indicate bugs or security-specific updates. This will significantly lower the chances of your devices being hacked.</li></ul>



<ul class="wp-block-list"><li><strong>Build up your resource library &#8211; </strong>To give your team additional resources, we recommend you check out some of our blogs, including: <a href="https://avasek.ca/2016-02-ransomware/" target="_blank" rel="noreferrer noopener">What is Ransomware? What can you do to protect yourself?</a>, <a href="https://avasek.ca/2017-08-5-basic-network-security-tips-for-small-businesses/" target="_blank" rel="noreferrer noopener">5 Basic Network Security Tips for Small Businesses</a>, and <a href="https://avasek.ca/2017-04-the-life-of-a-phish/" target="_blank" rel="noreferrer noopener">The Life of a Phish</a>.</li></ul>



<ul class="wp-block-list"><li><strong>Act swiftly in case of a breach</strong> &#8211; Suppose you sense that your organization may have been hacked, contact <a href="https://avasek.ca/breach-assistance/" target="_blank" rel="noreferrer noopener">Avasek&#8217;s Incident Response team</a> for help with mitigating the damage to your organization, your customers, and your reputation.</li></ul>



<ul class="wp-block-list"><li><strong>Become cyber resilient &#8211; </strong>Your data&#8217;s security is essential, which means that you need to have the right security systems in place to defend your organization against future attacks before they happen. <a href="https://avasek.ca/contact/" target="_blank" rel="noreferrer noopener">Contact us today</a> to learn more about how Avasek can help make your organization cyber resilient.</li></ul>



<div style="height:100px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>Start protecting your systems now.</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/">Is your organization’s data protected from potential cybersecurity threats?</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/is-your-organizations-data-protected-from-potential-cybersecurity-threats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2022 Cyber Risk Insights Conference – New York</title>
		<link>https://avasek.ca/2022-cyber-risk-insights-conference-new-york/</link>
					<comments>https://avasek.ca/2022-cyber-risk-insights-conference-new-york/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Wed, 28 Sep 2022 16:52:45 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[cyber risk industry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[event]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=743</guid>

					<description><![CDATA[<p>2022 Cyber Risk Insights Conference – New York is the world&#8217;s largest cyber risk &#38; insurance industry event for P&#38;C professionals and insurance buyers to learn about cyber risk management and response best practices. Join Avasek at the event, and enjoy a full day of in-person learning, networking, and business discussion. For more information, please...  <a class="excerpt-read-more" href="https://avasek.ca/2022-cyber-risk-insights-conference-new-york/" title="Read 2022 Cyber Risk Insights Conference – New York">Read more &#187;</a></p>
<p>The post <a href="https://avasek.ca/2022-cyber-risk-insights-conference-new-york/">2022 Cyber Risk Insights Conference – New York</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>2022 Cyber Risk Insights Conference – New York is the world&#8217;s largest cyber risk &amp; insurance industry event for P&amp;C professionals and insurance buyers to learn about cyber risk management and response best practices. </p>



<p>Join Avasek at the event, and enjoy a full day of in-person learning, networking, and business discussion.</p>



<p>For more information, please visit  <a href="https://www.advisenltd.com/2022-cyber-risk-insights-conference-new-york/" target="_blank" rel="noreferrer noopener">2022 Cyber Risk Insights Conference &#8211; New York.</a> </p>



<p><strong>WHEN:</strong> October 25, 2022 | New York Marriott Marquis</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/2022-cyber-risk-insights-conference-new-york/">2022 Cyber Risk Insights Conference – New York</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/2022-cyber-risk-insights-conference-new-york/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fal.Con 2022</title>
		<link>https://avasek.ca/fal-con-2022/</link>
					<comments>https://avasek.ca/fal-con-2022/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Fri, 02 Sep 2022 17:09:06 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[cyber risk industry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[event]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=724</guid>

					<description><![CDATA[<p>Fal.Con is where cybersecurity professionals strengthen their security posture and protect their organization in today&#8217;s rapidly evolving threat landscape. Join Avasek to learn how to identify the risks facing your organization, connect with industry insiders and get inspired about the impact you have on your company&#8217;s future. For more information, please visit: https://www.crowdstrike.com/events/fal-con/ WHEN: September...  <a class="excerpt-read-more" href="https://avasek.ca/fal-con-2022/" title="Read Fal.Con 2022">Read more &#187;</a></p>
<p>The post <a href="https://avasek.ca/fal-con-2022/">Fal.Con 2022</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Fal.Con is where cybersecurity professionals strengthen their security posture and protect their organization in today&#8217;s rapidly evolving threat landscape. Join Avasek to learn how to identify the risks facing your organization, connect with industry insiders and get inspired about the impact you have on your company&#8217;s future.</p>



<p></p>



<p>For more information, please visit: <a href="https://www.crowdstrike.com/events/fal-con/" target="_blank" rel="noreferrer noopener">https://www.crowdstrike.com/events/fal-con/</a></p>



<p><strong>WHEN:</strong> September 19 &#8211; 21, 2022 | Aria Resort &amp; Casino, Las Vegas</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/fal-con-2022/">Fal.Con 2022</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/fal-con-2022/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>9 Data Breach Statistics Your Business Needs to Know</title>
		<link>https://avasek.ca/9-data-breach-statistics-your-business-needs-to-know/</link>
					<comments>https://avasek.ca/9-data-breach-statistics-your-business-needs-to-know/#respond</comments>
		
		<dc:creator><![CDATA[Larissa Montecuollo]]></dc:creator>
		<pubDate>Thu, 11 Aug 2022 17:30:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=691</guid>

					<description><![CDATA[<p>If you think your business is at low risk of a cyberattack because it's too small for cybercriminals to notice, it’s time to change your thinking. According to 2016 threat data from Symantec, 43% of all cyberattacks target small businesses. This is a significant rise from the 18% seen in 2011.</p>
<p>The post <a href="https://avasek.ca/9-data-breach-statistics-your-business-needs-to-know/">9 Data Breach Statistics Your Business Needs to Know</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The modern economy is driven by data. No matter the sector, businesses rely heavily on the information they create, compile, and share. From the transport industry and media, to the biotech space and IT services, data underpins everything. Unfortunately, the bad guys know it, too.</p>



<p>As Avasek has seen all too often, company systems and networks are constantly being targeted by malicious actors, determined to get access to valuable internal data so it can be exploited in a myriad of ways. From trade secrets to client contact books, hackers have developed a broad array of technical skills to pry information right out of a firm’s hands. With this in mind, we’ve compiled a list of 10 breach statistics so you can better understand the risks your business faces.</p>



<h2 class="wp-block-heading">1. The average cost of a U.S. company data breach is roughly $9.5 million.</h2>



<p><a href="https://www.ibm.com/downloads/cas/3R8N1DZJ" target="_blank" rel="noreferrer noopener">According to a recent IBM study</a>, data hacks cost firms in the United States an average of 9.44 million. In fact, U.S. businesses spend the most recovering from such breaches.</p>



<h2 class="wp-block-heading"><strong>2. </strong>Data breaches impacted almost 300 million individuals in the U.S. last year.</h2>



<p><a href="https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/" target="_blank" rel="noreferrer noopener">Data compiled by Statista shows</a> data records for over 298 million U.S. residents were illicitly accessed last year. Healthcare, financial services, and manufacturing were the most targeted industries.</p>



<h2 class="wp-block-heading">3. Criminal organizations were behind 55% of cyber breaches in 2020.</h2>



<p><a href="https://www.verizon.com/business/resources/reports/dbir/2020/summary-of-findings/" target="_blank" rel="noreferrer noopener">A report from Verizon</a> states more than half of data breaches in 2020 were orchestrated by criminal gangs, who were mostly driven by the potential financial gains. However, the study also notes secondary motivations were also a prominent factor, concluding many hacks were part of bigger, more complex schemes.</p>



<h2 class="wp-block-heading">4. In 2020, misconfiguration errors played a role in over 40% of data breaches.</h2>



<p><a href="https://www.verizon.com/business/resources/reports/dbir/2020/smb-data-breaches-deep-dive/" target="_blank" rel="noreferrer noopener">Verizon found</a> an increasing number of malicious actors exploited misconfiguration errors in 2020. The report notes misconfiguration can include systems administrators forgetting to set cloud storage bins to private.</p>



<h2 class="wp-block-heading">5. U.S. organizations lost about $50 million in ransomware attacks in 2021.</h2>



<p>The <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf" target="_blank" rel="noreferrer noopener">FBI says</a> it heard from over 3,700 businesses last year whose data was locked up by malicious attackers. The agency notes cybercriminals strong-arm companies into paying ransoms by threatening to make proprietary information public or even destroy it all together.</p>



<h2 class="wp-block-heading">&nbsp;6. 48% of malicious email attachments are presented as Microsoft Office files.</h2>



<p>As this statistic from a <a href="https://www.broadcom.com/support/security-center">Symantec study</a> shows, it’s important for all staff to remain vigilant about what they download and open. And of course, with Microsoft tools being such a huge part of company culture for four decades, it’s no surprise hackers rely on this trick to get into networks.</p>



<h2 class="wp-block-heading">7. On average, hackers attack every 39 seconds.</h2>



<p><a href="https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds" target="_blank" rel="noreferrer noopener">Researchers at the University of Maryland have demonstrated</a> just how relentless malicious actors can be. As the study shows, many networks have to be robust enough to fend off over 2,200 hack attempts every single day.</p>



<h2 class="wp-block-heading">8. 83% of breached companies experience additional attacks.</h2>



<p>As <a href="https://www.ibm.com/downloads/cas/3R8N1DZJ" target="_blank" rel="noreferrer noopener">IBM’s data suggests</a>, a company that suffers a data breach is highly likely to be targeted again. The study notes a majority of hacked firms had to increase prices to help recover costs.</p>



<h2 class="wp-block-heading">9. 96% of businesses have been targeted by phishing emails.</h2>



<p><a href="https://assets.mimecast.com/api/public/content/2eb94094d7594556b73a6d6183b7d435?v=8fa06ef0&amp;_ga=2.101298561.107181020.1649073572-463073932.1649073572" target="_blank" rel="noreferrer noopener">A 2022 study by Mimecast</a> shows a vast majority of companies received phishing emails over the preceding 12 months. The report also notes 80% of firms expect to have to deal with the fallout from a breach originating via email.</p>



<p></p>



<p>As the statistics show, for companies, data breach threats are not only persistent, they are extremely costly. Fortunately, Avasek is an experienced leader in helping businesses both defend and recover from such devastating attacks. <a href="https://avasek.ca/service/incident-response/">Find out more</a> about how Avasek can assist your operation today so that you’re not picking up the pieces tomorrow.</p>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>Start protecting your systems now.</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/9-data-breach-statistics-your-business-needs-to-know/">9 Data Breach Statistics Your Business Needs to Know</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/9-data-breach-statistics-your-business-needs-to-know/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NetDiligence Cyber Risk Summit (Bermuda)</title>
		<link>https://avasek.ca/netdiligence-cyber-risk-summit-bermuda/</link>
					<comments>https://avasek.ca/netdiligence-cyber-risk-summit-bermuda/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Tue, 09 Aug 2022 16:19:22 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[cyber risk industry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[summit]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=676</guid>

					<description><![CDATA[<p>Join us for the return of the NetDiligence® Cyber Risk Summit Bermuda. Hear from over 50 speakers in info-packed sessions and comprehensive discussions on the latest in cyber coverage and cybersecurity solutions. For more information, please visit: https://netdiligence.com/conferences/cyber-risk-summit-bermuda-2022 WHEN: November 16th-17th, 2022 &#124; Bermuda</p>
<p>The post <a href="https://avasek.ca/netdiligence-cyber-risk-summit-bermuda/">NetDiligence Cyber Risk Summit (Bermuda)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Join us for the return of the NetDiligence® Cyber Risk Summit Bermuda. Hear from over 50 speakers in info-packed sessions and comprehensive discussions on the latest in cyber coverage and cybersecurity solutions.</p>



<p></p>



<p>For more information, please visit: <a href="https://netdiligence.com/conferences/cyber-risk-summit-bermuda-2022" target="_blank" rel="noreferrer noopener">https://netdiligence.com/conferences/cyber-risk-summit-bermuda-2022</a><a href="https://www.events4sure.com/oct2022newyork" target="_blank" rel="noreferrer noopener"><br></a></p>



<p><strong>WHEN:</strong> November 16th-17th, 2022 | Bermuda</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/netdiligence-cyber-risk-summit-bermuda/">NetDiligence Cyber Risk Summit (Bermuda)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/netdiligence-cyber-risk-summit-bermuda/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NetDiligence Cyber Risk Summit (Santa Monica)</title>
		<link>https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/</link>
					<comments>https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Mon, 08 Aug 2022 19:49:48 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[cyber risk industry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[summit]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=654</guid>

					<description><![CDATA[<p>The Cyber Risk Summit by NetDiligence takes place in Santa Monica and is attended by cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event, this conference features three days of workshops and panel discussions by leading cyber experts who share their insights on hot topics, trends, and...  <a class="excerpt-read-more" href="https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/" title="Read NetDiligence Cyber Risk Summit (Santa Monica)">Read more &#187;</a></p>
<p>The post <a href="https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/">NetDiligence Cyber Risk Summit (Santa Monica)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Risk Summit by NetDiligence takes place in Santa Monica and is attended by cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event, this conference features three days of workshops and panel discussions by leading cyber experts who share their insights on hot topics, trends, and cybersecurity concerns. Connect with leaders in cyber risk and privacy liability and learn from their experiences on current and emerging concerns in the ever-changing cyber landscape.</p>



<p></p>



<p>For more information please visit: <a href="https://netdiligence.com/conferences/cyber-risk-summit-santa-monica-2022" target="_blank" rel="noreferrer noopener">https://netdiligence.com/conferences/cyber-risk-summit-santa-monica-2022<br></a></p>



<p><strong>WHEN:</strong> October 10th-12th, 2022 | Santa Monica</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/">NetDiligence Cyber Risk Summit (Santa Monica)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/cyber-risk-summit-netdiligence-santa-monica/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DattoCon</title>
		<link>https://avasek.ca/dattocon/</link>
					<comments>https://avasek.ca/dattocon/#respond</comments>
		
		<dc:creator><![CDATA[trillion]]></dc:creator>
		<pubDate>Wed, 15 Jun 2022 19:39:39 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[convention]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[event]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=651</guid>

					<description><![CDATA[<p>Reserve your spot to witness the unveiling of Datto&#8217;s most powerful cybersecurity solution yet! Get savvy about security and deliver sophisticated protection to your end-clients with confidence and ease in today&#8217;s complex threat environment. Gain inspiration from renowned speakers and engage with Datto innovators while exchanging ideas with fellow MSPs. For more information, please visit:...  <a class="excerpt-read-more" href="https://avasek.ca/dattocon/" title="Read DattoCon">Read more &#187;</a></p>
<p>The post <a href="https://avasek.ca/dattocon/">DattoCon</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Reserve your spot to witness the unveiling of Datto&#8217;s most powerful cybersecurity solution yet! Get savvy about security and deliver sophisticated protection to your end-clients with confidence and ease in today&#8217;s complex threat environment. Gain inspiration from renowned speakers and engage with Datto innovators while exchanging ideas with fellow MSPs.</p>



<p></p>



<p>For more information, please visit: <a href="https://www.dattocon.com/" target="_blank" rel="noreferrer noopener">https://www.dattocon.com/</a><a href="https://www.events4sure.com/oct2022newyork" target="_blank" rel="noreferrer noopener"><br></a></p>



<p><strong>WHEN:</strong> September 13th, 2022 | Washington, D.C</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/dattocon/">DattoCon</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/dattocon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NetDiligence Cyber Risk Summit (Philadelphia)</title>
		<link>https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/</link>
					<comments>https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/#respond</comments>
		
		<dc:creator><![CDATA[Larissa Montecuollo]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 15:24:23 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[cyber risk industry]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[summit]]></category>
		<guid isPermaLink="false">https://avasek.ca/?p=583</guid>

					<description><![CDATA[<p>Join Avasek for a NetDiligence cybersecurity networking event. The NetDiligence® Cyber Risk Summit in Philadelphia is attended by cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event, this conference features three days of workshops and panel discussions by leading cyber experts who share their insights on hot...  <a class="excerpt-read-more" href="https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/" title="Read NetDiligence Cyber Risk Summit (Philadelphia)">Read more &#187;</a></p>
<p>The post <a href="https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/">NetDiligence Cyber Risk Summit (Philadelphia)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading">Join Avasek for a NetDiligence cybersecurity networking event.</h2>



<p>The NetDiligence® Cyber Risk Summit in Philadelphia is attended by cyber insurance, legal/regulatory, and technology leaders from all over the globe. A premier education and networking event, this conference features three days of workshops and panel discussions by leading cyber experts who share their insights on hot topics, trends, and cybersecurity concerns. Connect with leaders in cyber risk and privacy liability and learn from their experiences on current and emerging concerns in the ever-changing cyber landscape.<br><br>For more information, please visit: <a href="https://netdiligence.com/conferences/cyber-risk-summit-philadelphia-2022" target="_blank" rel="noreferrer noopener">https://netdiligence.com/conferences/cyber-risk-summit-philadelphia-2022<br></a></p>



<p><strong>WHEN:</strong> June 1-3, 2022</p>



<div style="height:60px" aria-hidden="true" class="wp-block-spacer"></div>


<div class="contact-full breakout one-col">
  <div class="wrap">
    <div class="contact-full-first">
      <h2>How cyber resilient is your organization?</h2>
              <div class="cf-intro">Avasek not only cleans up after a cyber-attack, but we also fortify your systems’ security so you can fend off future attempted attacks before they can even happen.</div>
                </div>
    <div class="contact-full-second">
      [contact-form-7]    </div>
  </div>
</div><p>The post <a href="https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/">NetDiligence Cyber Risk Summit (Philadelphia)</a> appeared first on <a href="https://avasek.ca">Avasek</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://avasek.ca/netdiligence-cyber-risk-summit-philadelphia/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
