Cyber Resilience Workshop: Protecting Your Business the Right Way
Register here Date: October 23, 2024Time: 8:00 am – 11:00 amHybrid Event: In person at RLB Guelph Office, 103-197 Hanlon Creek Boulevard, Guelph; Live streamed…
Hybrid Event: Cyber Security Reality Vs. Fake News
Register here Date: October 9, 2024Time: 9:30 am – 12:00 pmLocation: 150 King Street West, Suite 2401, Toronto Join Birmingham Consulting and Prolink for a…
Webinar: Cyber Security Reality Vs. Fake News
Register here Date: October 16, 2024Time: 12:00 pm – 1:00 pm Location: Zoom Webinar If you’re an executive and you’ve wanted to learn how to…
How Cyber Insurance Works
What is cyber insurance? Cyber insurance enables businesses to mitigate the costs that arise from cyber incidents, including ransomware. This type of insurance is essential…
Snowflake breach: What happened?
And could it have been avoided? What happened with the Snowflake breach? 34 million users (already) were recently compromised in a data breach of the…
Cyber Insurance Terms Debunked
When working with clients to submit applications for Cyber Insurance, we often hear that they don’t understand the terminology on the application form. For anyone who…
Some Common Mistakes to Avoid when Choosing an IT Consultant
Obviously, the easiest advice we can give here is to hire Birmingham Consulting Inc. to be your IT consultant. But for people who want a second…
The True Cost of Poor IT Support
No one is exempt from IT problems, but it’s hard to put a dollar figure to the actual hard costs to your business when IT…
Why Bother with Cyber Insurance?
We continue to alert our clients about the increasing need for cyber insurance. Especially when we continue to hear that one of the largest cyber liability…
Cyber Insurance Demands Better Security – Who Knew?
Actioning a new cyber security policy or procedure can be an intense change for a company. Certainly, as a cyber security and technology company, we’ve heard it…
The Cyber Company that Cried Wolf
Sometimes I feel like the little boy who cried wolf, especially when it comes to the latest cyber attacks and breaches. Do people really comprehend…
An AI Wrote this blog
We decided to sit down and ask ChatGPT to write a blog on its threat to cyber security. ChatGPT: (Note that the first thing it…
Are You Hacked But Don’t Know It Yet?
I recently had the privilege of meeting a business analyst from BDC. She shared some not-yet published information from a study BDC conducted. Most statics available online…
We Interrupt This Program…
There are many sites that track current vulnerabilities in the world of cyber warfare. However, this one is severe enough to share with our readers: There…
What is a Tabletop Exercise (TTX)?
A tabletop exercise (TTX) is a method to test the effectiveness of a cyber incident response plan (IRP) by simulating a cyber breach. To be most…
The Cyber Butterfly Effect
In 1972, at the 139th meeting of the American Association for the Advancement of Science, meteorologist Edward Lorenz posed the question “Does the flap of a butterfly’s wings in…
Shameless Self Promotion: The Heritage Of Our Home
Birmingham Consulting has the privilege of conducting business in a historical building within the heritage district of Waterdown, Ontario, at 21 Mill Street North. A…
Cyber Security vs. Cyber Resilience – What’s the Difference?
Is your business cyber secure, or cyber resilient? Cyber security refers to the defensive measures to protect your business against cyber attacks. Think next-gen endpoint protection, spam filtering,…
Why The Kaseya Ransomware Event Will Forever Change the World Of Cyber Security
One of the largest – if not the largest – ransomware events in history took place over the U.S. Independence Day long weekend. A recap: Kaseya, a company…