71% Employee training & awareness
Did you know?
Click the stat to
learn more
44% Advanced security technologies
29% Vendor security assessment
46% Regular security audits & assessments
51% Customer authentication
56% Secure payment processing
58% Continuous monitoring & updates
62% Access controls
62% Data protection & privacy policies
Did you know?
Employee training& awareness
Employees without proper training may not recognize cyber threats to your organization, and this lack of awareness may lead to data leaks and breaches of sensitive information — significantly impacting the privacy of your citizens.
Did you know?
Data protection & privacy policies
Quebec’s Law 25 dictates that all organizations must have a Privacy Officer or equivalent position [and] publicly available privacy policies and requirements for internal privacy practices. These policies are becoming more commonplace.
Did you know?
Access controls
Social engineering tests (evaluating how easily employees can be tricked into granting unauthorized access) and physical security reviews (testing whether unauthorized personnel can gain access to critical systems in facilities) are two of the most effective security tactics.
Did you know?
Continuous monitoring
& updates
Protective measures such as implementing operational technology (OT) security environments and ensuring that your systems are constantly monitored can help reduce risks to your municipal organization.
Did you know?
Secure payment
processing
PCI DSS 4.0 is the new global Payment Card Industry Data Security Standard. It is intended to provide a baseline for the technical and operational requirements designed to protect account data as threats continue to evolve.
Did you know?
Customer authentication
Quebec’s Law 25 introduced legislative requirements for authentication, including some unique requirements regarding biometric data (voiceprints, fingerprints, DNA, etc.).
Did you know?
Regular security audits
& assessments
Internal audits provide senior management with independent and objective assurance on governance, risk management, and controls pertaining to cyber security. This includes assessing the overall effectiveness of the first and second lines of defense (management and information security, respectively) in managing and mitigating cyber risks.
Did you know?
Advanced securitytechnologies
AI is transforming cyber security. It processes vast amounts of data, recognizes patterns, and analyzes historical attack data to spot vulnerabilities. Local governments are investing in advanced cyber security technologies and ongoing training programs to safeguard data and private information, and to protect against threats.
Did you know?
Vendor security
assessment
If your vendors have any access to your data or sensitive information, you should prioritize vetting their cyber security practices. Do they have the right controls in place? Do they have a plan in the event of a security breach? Do you have cyber security insurance in the event of a third-party security breach?
Did you know?
Did you know?
Did you know?
Did you know?
Did you know?
Did you know?
Did you know?
Did you know?
