<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Partek I.T. Solutions &#8212; News</title>
	<atom:link href="https://partek.ca/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://partek.ca/category/news/</link>
	<description>Medicine Hat&#039;s Managed I.T. Service Provider</description>
	<lastBuildDate>Thu, 12 Mar 2026 19:57:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://partek.ca/wp-content/uploads/2022/11/cropped-Partek-Favicon-32x32.png</url>
	<title>Partek I.T. Solutions &#8212; News</title>
	<link>https://partek.ca/category/news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>⚠️ Microsoft 365 Email and Services Outage</title>
		<link>https://partek.ca/microsoft-365-email-services-outage/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 22 Jan 2026 22:00:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=34410</guid>

					<description><![CDATA[<p>Thousands of users worldwide are reporting login errors, emails not sending/receiving, and general connectivity problems. Microsoft has officially acknowledged the issue and is actively investigating the cause.</p>
<p>The post <a href="https://partek.ca/microsoft-365-email-services-outage/">⚠️ Microsoft 365 Email and Services Outage</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="34410" class="elementor elementor-34410">
				<div class="elementor-element elementor-element-bd97924 e-flex e-con-boxed e-con e-parent" data-id="bd97924" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3f97386 e-con-full e-flex e-con e-child" data-id="3f97386" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-00b65df elementor-widget elementor-widget-heading" data-id="00b65df" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">January 22, 2026</h5>				</div>
				<div class="elementor-element elementor-element-1b9fd8a elementor-widget elementor-widget-heading" data-id="1b9fd8a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Microsoft 365 Email &amp; Services Outage</h3>				</div>
				<div class="elementor-element elementor-element-da4d18b elementor-widget elementor-widget-text-editor" data-id="da4d18b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="xdj266r x14z9mp xat24cr x1lziwak x1vvkbs x126k92a"><h4 dir="auto"><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';">Many organizations are currently experiencing issues with Microsoft 365 services, including Outlook email, Teams, Defender, Purview, and other Microsoft apps.</span></h4></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto">This isn’t an isolated problem; thousands of users worldwide are reporting login errors, emails not sending/receiving, and general connectivity problems.</div><div dir="auto"> </div><div dir="auto">Microsoft has officially acknowledged the issue and is actively investigating the cause: <span class="html-span xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs"><a class="x1i10hfl xjbqb8w x1ejq31n x18oe1m7 x1sy0etr xstzfhl x972fbf x10w94by x1qhh985 x14e42zd x9f619 x1ypdohk xt0psk2 x3ct3a4 xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x16tdsg8 x1hl2dhg xggy1nq x1a2a7pz xkrqix3 x1sur9pj x1fey0fg x1s688f" tabindex="0" role="link" href="https://status.cloud.microsoft/m365/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMUNpRGFRZ2kyN3RpUmZqNnNydGMGYXBwX2lkEDIyMjAzOTE3ODgyMDA4OTIAAR5PsJcKeuyJZ7rxV7U1WugP3Mtn6EfJXWt3R7LRpmGN5At7La3iMx4HYC3jMw_aem_90V7atNZQLUYJCECt-HNfg" target="_blank" rel="nofollow noopener noreferrer">https://status.cloud.microsoft/m365/</a></span></div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto"> </div><h5 dir="auto">What’s Happening:</h5></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><ul><li dir="auto">Microsoft 365 services including Outlook email are down or impacted for many users.</li><li dir="auto">Users may see delays, errors, or inability to send/receive messages.</li><li dir="auto">Microsoft reports that part of its North American infrastructure isn’t processing traffic normally and engineers are working on a fix.</li></ul></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><h5 dir="auto"> </h5><h5 dir="auto">What to do right now:</h5><ul><li dir="auto"><span style="font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';">If email isn’t working, don’t panic. This is a platform-level outage that Microsoft must fix, not an issue with your device or password.</span></li><li dir="auto">Give it a bit of time and try again shortly (many outages resolve in waves).</li><li dir="auto">If something is urgent, use an alternate method (phone/text/Teams) temporarily.</li></ul></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto"> </div><div dir="auto">Please note, due to the Microsoft disruption, <strong>our ability to receive support requests is also impacted,</strong> and we may not receive new ticket emails or replies to existing tickets right away.</div><div dir="auto"> </div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto">If you need help urgently, please call our office <a href="tel:4034883333">(403) 488-3333</a> and we’ll get you taken care of.</div><div dir="auto"> </div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto">Thanks for your patience, we’re monitoring this closely and will share updates as we get them.</div></div>								</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/microsoft-365-email-services-outage/">⚠️ Microsoft 365 Email and Services Outage</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Partek Recognized as the 2025 Sherweb Ambassador Award Winner in Canada</title>
		<link>https://partek.ca/partek-recognized-as-the-2025-sherweb-ambassador-award-winner-in-canada/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 05 Dec 2025 20:30:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=34311</guid>

					<description><![CDATA[<p>Partek has been recognized by Sherweb as a 2025 Ambassador Award Winner in Sherweb’s annual Partner Recognition Program.</p>
<p>The post <a href="https://partek.ca/partek-recognized-as-the-2025-sherweb-ambassador-award-winner-in-canada/">Partek Recognized as the 2025 Sherweb Ambassador Award Winner in Canada</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="34311" class="elementor elementor-34311">
				<div class="elementor-element elementor-element-bd97924 e-flex e-con-boxed e-con e-parent" data-id="bd97924" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3f97386 e-con-full e-flex e-con e-child" data-id="3f97386" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-72a7af2 e-con-full e-flex e-con e-child" data-id="72a7af2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-0d16955 elementor-widget__width-initial elementor-widget elementor-widget-image" data-id="0d16955" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img fetchpriority="high" decoding="async" width="800" height="800" src="https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-1024x1024.png" class="attachment-large size-large wp-image-34314" alt="" srcset="https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-1024x1024.png 1024w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-300x300.png 300w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-150x150.png 150w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-768x768.png 768w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-1536x1536.png 1536w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-2048x2048.png 2048w, https://partek.ca/wp-content/uploads/2025/12/Sherweb_Ambassador_2025LogoAward_CAN-120x120.png 120w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				<div class="elementor-element elementor-element-1b9fd8a elementor-widget__width-initial elementor-widget elementor-widget-heading" data-id="1b9fd8a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Partek Recognized as the 2025 Sherweb Ambassador Award Winner in Canada

</h3>				</div>
				</div>
				<div class="elementor-element elementor-element-da4d18b elementor-widget elementor-widget-text-editor" data-id="da4d18b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="flex max-w-full flex-col flex-grow"><div class="min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="018b14b8-8d3e-4b5d-9678-c625acc087ea"><div class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"><div class="markdown prose w-full break-words dark:prose-invert dark"><p style="font-weight: 400;"><strong>Medicine Hat, Alberta — December 5<sup>th</sup> , 2025</strong> — Partek, a leading Managed Service Provider (MSP) specializing in IT Management and Cybersecurity for the Western Canada SMB market, today announced it has been recognized by <strong>Sherweb</strong>, a global cloud solutions distributor, as a <strong>2025 Ambassador Award Winner</strong> in Sherweb’s annual Partner Recognition Program.</p><p style="font-weight: 400;">The Sherweb Partner Recognition Awards celebrate outstanding MSPs that demonstrate excellence, innovation, and growth within the Sherweb partner ecosystem. Partek earned the Ambassador distinction for embracing Sherweb’s values and promoting Sherweb solutions within the partner and client community.</p><p style="font-weight: 400;"><em>“This award reflects the strong partnership we’ve built with Sherweb and our shared commitment to delivering secure, modern solutions for our clients. We’re excited to continue driving innovation together in the years ahead.”</em> – James Parsons, CEO of Partek</p><p style="font-weight: 400;">“We’re honored to recognize Partek as our 2025 Ambassador Award winner,” said Jim O’Driscoll, Vice President of Sales at Sherweb. “Their enthusiasm for Sherweb’s vision, along with their willingness to share insights and champion our values, makes them an exceptional partner and advocate.”</p><p style="font-weight: 400;"><strong>About Partek</strong><br />Partek is a Managed Service Provider based in Medicine Hat, Alberta, delivering secure, modern IT solutions to small and mid-sized organizations across Western Canada. Our services include managed IT, cybersecurity, cloud solutions, and technology strategy designed to help businesses operate with confidence and resilience. With a focus on long-term partnership, Partek combines technical expertise with a client-first approach to support organizations as they grow, adapt, and navigate today’s evolving digital landscape.</p><p style="font-weight: 400;"><strong> </strong></p><p style="font-weight: 400;"><strong>About Sherweb</strong><br /><span data-ogsc="black">Since 1998, Sherweb has been connecting businesses with IT solutions tailored to their needs. Our growing team of over 1,000 experts help our reseller partners succeed with software from leading brands and value-added services that help them offload technical operations and extend their cloud expertise, from tech support to cybersecurity.</span></p><p style="font-weight: 400;"> </p></div></div></div></div>								</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/partek-recognized-as-the-2025-sherweb-ambassador-award-winner-in-canada/">Partek Recognized as the 2025 Sherweb Ambassador Award Winner in Canada</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TEKDAY 2025</title>
		<link>https://partek.ca/tekday-2025/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 29 Sep 2025 19:46:47 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=33895</guid>

					<description><![CDATA[<p>2025 Presented by: TEK DAY Elevate your business with expert strategies on leveraging technology, enhancing security, and building resilience at this exclusive, free event. NOV 04 TUESDAY 8AM &#8211; 1PM Join us for TEK DAY! This free, exclusive half-day event is designed for one purpose: helping local businesses protect their data, simplify their technology, and [&#8230;]</p>
<p>The post <a href="https://partek.ca/tekday-2025/">TEKDAY 2025</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="33895" class="elementor elementor-33895">
				<div class="elementor-element elementor-element-4ddb60e3 e-con-full e-flex e-con e-parent" data-id="4ddb60e3" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-63736958 e-flex e-con-boxed e-con e-child" data-id="63736958" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-4274b694 e-con-full elementor-hidden-mobile e-flex e-con e-child" data-id="4274b694" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-69d558c3 elementor-widget__width-inherit e-transform elementor-hidden-mobile elementor-widget elementor-widget-heading" data-id="69d558c3" data-element_type="widget" data-e-type="widget" data-settings="{&quot;_transform_rotateZ_effect&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:-90,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_laptop&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_tablet&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;_transform_rotateZ_effect_mobile&quot;:{&quot;unit&quot;:&quot;deg&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">2025</h3>				</div>
				</div>
		<div class="elementor-element elementor-element-6ce5f6c6 e-con-full e-flex e-con e-child" data-id="6ce5f6c6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-70b0a48d elementor-widget elementor-widget-heading" data-id="70b0a48d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default">Presented by:</h6>				</div>
				<div class="elementor-element elementor-element-74357992 elementor-widget elementor-widget-image" data-id="74357992" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img decoding="async" width="800" height="266" src="https://partek.ca/wp-content/uploads/2025/09/Partek-Logo-white.svg" class="attachment-large size-large wp-image-33898" alt="" srcset="https://partek.ca/wp-content/uploads//2025/09/Partek-Logo-white.svg 150w, https://partek.ca/wp-content/uploads//2025/09/Partek-Logo-white.svg 300w, https://partek.ca/wp-content/uploads//2025/09/Partek-Logo-white.svg 768w, https://partek.ca/wp-content/uploads//2025/09/Partek-Logo-white.svg 1024w, https://partek.ca/wp-content/uploads//2025/09/Partek-Logo-white.svg 12w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				<div class="elementor-element elementor-element-72557250 elementor-widget elementor-widget-heading" data-id="72557250" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h1 class="elementor-heading-title elementor-size-default">TEK DAY</h1>				</div>
				<div class="elementor-element elementor-element-2c7bc1d9 elementor-widget__width-inherit elementor-widget-tablet__width-initial elementor-widget elementor-widget-heading" data-id="2c7bc1d9" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h2 class="elementor-heading-title elementor-size-default">Elevate your business with expert strategies on leveraging technology, enhancing security, and building resilience at this exclusive, free event.</h2>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-e8a085b e-con-full e-flex e-con e-child" data-id="e8a085b" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-25932146 e-con-full e-flex e-con e-child" data-id="25932146" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-64d8e7c6 e-con-full elementor-hidden-mobile e-flex e-con e-child" data-id="64d8e7c6" data-element_type="container" data-e-type="container">
				</div>
		<div class="elementor-element elementor-element-2d9d443b e-con-full e-flex e-con e-child" data-id="2d9d443b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-50309d50 elementor-widget elementor-widget-heading" data-id="50309d50" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">NOV</h3>				</div>
				<div class="elementor-element elementor-element-49b3f4d8 elementor-widget elementor-widget-heading" data-id="49b3f4d8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">04</h3>				</div>
				<div class="elementor-element elementor-element-69aaa43a elementor-widget-divider--view-line elementor-widget elementor-widget-divider" data-id="69aaa43a" data-element_type="widget" data-e-type="widget" data-widget_type="divider.default">
							<div class="elementor-divider">
			<span class="elementor-divider-separator">
						</span>
		</div>
						</div>
				<div class="elementor-element elementor-element-b5cfb11 elementor-widget elementor-widget-heading" data-id="b5cfb11" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">TUESDAY</h3>				</div>
				<div class="elementor-element elementor-element-59ef4ef7 elementor-widget elementor-widget-heading" data-id="59ef4ef7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">8AM - 1PM</h3>				</div>
				</div>
		<div class="elementor-element elementor-element-669659c2 e-con-full e-flex e-con e-child" data-id="669659c2" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
		<div class="elementor-element elementor-element-6bb93698 e-con-full e-flex e-con e-child" data-id="6bb93698" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-2dbfb0b9 elementor-view-default elementor-widget elementor-widget-icon" data-id="2dbfb0b9" data-element_type="widget" data-e-type="widget" data-widget_type="icon.default">
							<div class="elementor-icon-wrapper">
			<div class="elementor-icon">
			<svg xmlns="http://www.w3.org/2000/svg" xmlns:i="http://ns.adobe.com/AdobeIllustrator/10.0/" width=".747375in" height=".782234in" viewBox="0 0 53.810987 56.320836"><g><g id="Text"><path d="M29.652344,33.70128c-1.725586,2.039062-3.451172,4.157227-5.647949,5.804688-2.666992,1.960938-5.961914,1.882812-8.550293-.078125-.313965-.235352-.62793-.62793-.784668-1.098633-.862793-2.588867-.78418-5.176758.470703-7.6875,1.02002-2.039062,1.804199-4.236328,2.824219-6.275391,2.196289-4.236328,5.020508-7.844727,9.177734-10.276367,1.961426-1.176758,4.07959-1.176758,6.197266-.470703,1.726074.548828,2.432129,1.882812,3.05957,3.84375.78418-1.098633,1.254883-1.960938,1.882812-2.746094,1.098145-1.568359,2.82373-1.803711,4.23584-.706055.706055.62793,1.02002,1.333984.706055,2.275391l-.941406,2.588867c-1.176758,3.294922-2.588867,6.588867-3.529785,10.041016-.549316,2.039062-1.098633,4.157227-.470703,6.353516.235352.785156.470703,1.491211.78418,2.275391.157227,0,.313965,0,.470703.078125.784668-1.019531,1.726074-2.039062,2.510254-3.137695,1.804199-2.588867,3.687012-5.255859,4.47168-8.47168.470703-1.961914.78418-3.84375,1.019531-5.805664.156738-1.254883.235352-2.509766.313965-3.764648.156738-2.746094-.157227-5.570312-1.412109-8.001953-1.176758-2.431641-3.05957-4.314453-6.040527-4.941406-3.294434-.785156-6.196777.548828-9.099609,1.411133-2.588379.706055-5.020508,1.804688-7.373535,3.05957-3.138184,1.804688-5.961914,4.236328-8.080078,7.216797-1.568848,2.275391-2.902344,4.785156-4.23584,7.138672-.549316.941406-.941406,1.882812-1.333984,2.824219-1.646973,4.785156-3.137695,9.648438-3.216309,14.826172-.078125,1.882812.157227,3.6875.784668,5.413086,1.02002,2.666992,3.137695,3.686523,5.569824,4.235352,3.529785.785156,6.746094-.078125,9.491699-2.431641,1.725586-1.490234,3.530273-2.902344,5.334473-4.314453l.78418-.626953c1.02002-.62793,2.432129-.706055,2.980957-.079102.706055.706055.706055,2.588867-.078125,3.452148-1.255371,1.333008-2.510742,2.666992-3.844238,3.84375-1.960938,1.725586-4.079102,3.294922-6.118652,4.863281-2.588867,1.882813-5.569336,2.196289-8.550293,1.882813-2.510254-.313477-5.020508-.863281-7.060059-2.353516-2.66748-1.960938-5.020508-4.314453-5.491211-7.922852-.235352-1.804688-.863281-3.608398-.863281-5.491211,0-3.608398.941406-7.138672,2.196777-10.589844,1.098145-3.137695,2.274902-6.275391,3.922363-9.178711,3.373047-5.961914,7.216797-11.453125,12.864746-15.296875C23.141602,2.4796,27.848145.911241,32.868652.440538c2.274902-.157227,4.628418,0,6.90332-.314453,4.000977-.548828,7.138672.706055,9.962402,3.530273,2.118164,2.040039,2.980957,4.549805,3.530273,7.216797,1.098145,5.413086.470703,10.826172-1.254883,16.082031-.62793,1.803711-1.726074,3.451172-2.588867,5.098633-.627441,1.098633-1.255371,2.196289-1.961426,3.21582-2.117676,3.609375-5.020508,6.276367-9.334961,7.060547-1.725586.235352-3.137695.078125-4.314453-1.569336-1.254883-1.647461-2.117676-3.373047-2.353027-5.491211-.078613-.941406-.313965-1.881836-.470703-3.137695-.549316.62793-1.02002,1.098633-1.333984,1.569336ZM35.536133,19.031358c-1.02002-.234375-1.804199-.469727-2.66748-.626953-1.17627-.235352-2.196289-.157227-3.294434.706055-2.039551,1.647461-3.373047,3.765625-4.628418,5.961914-1.647461,2.824219-2.745605,5.804688-3.529785,9.255859,5.412598-4.785156,9.805664-9.961914,14.120117-15.296875Z"></path></g></g><metadata></metadata></svg>			</div>
		</div>
						</div>
		<div class="elementor-element elementor-element-3c808933 e-con-full e-flex e-con e-child" data-id="3c808933" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6e043059 elementor-widget elementor-widget-image" data-id="6e043059" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img decoding="async" width="3" height="1" src="https://partek.ca/wp-content/uploads/2025/09/EsplanadeMainLogo.svg" class="attachment-full size-full wp-image-33900" alt="" srcset="https://partek.ca/wp-content/uploads//2025/09/EsplanadeMainLogo.svg 150w, https://partek.ca/wp-content/uploads//2025/09/EsplanadeMainLogo.svg 300w, https://partek.ca/wp-content/uploads//2025/09/EsplanadeMainLogo.svg 768w, https://partek.ca/wp-content/uploads//2025/09/EsplanadeMainLogo.svg 1024w, https://partek.ca/wp-content/uploads//2025/09/EsplanadeMainLogo.svg 3w" sizes="(max-width: 3px) 100vw, 3px" />															</div>
				</div>
				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-29fbbd65 e-con-full offset-border e-flex e-con e-child" data-id="29fbbd65" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-180d523c e-con-full e-flex e-con e-child" data-id="180d523c" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
		<div class="elementor-element elementor-element-51d17adc e-con-full e-flex e-con e-child" data-id="51d17adc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-48995611 elementor-widget elementor-widget-heading" data-id="48995611" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Join us for TEK DAY!</h3>				</div>
				<div class="elementor-element elementor-element-71a2394a elementor-widget elementor-widget-heading" data-id="71a2394a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default">This free, exclusive half-day event is designed for one purpose: helping local businesses protect their data, simplify their technology, and future-proof their operations. We’re bringing in top IT, cybersecurity, and AI experts from across North America to share practical, real-world strategies you can implement for your business.</h6>				</div>
				<div class="elementor-element elementor-element-6c706db5 elementor-widget elementor-widget-heading" data-id="6c706db5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<p class="elementor-heading-title elementor-size-default">Each year brings its own stories and takeaways, and TEKDAY 2024 was no exception. From engaging sessions to valuable networking, TEK DAY has become a trusted space for local businesses to learn, connect, and grow together.</p>				</div>
		<div class="elementor-element elementor-element-74a9669 e-con-full e-flex e-con e-child" data-id="74a9669" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-c340234 elementor-align-left elementor-tablet-align-left elementor-widget__width-auto elementor-widget elementor-widget-button" data-id="c340234" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-sm" href="https://tekday.partek.ca/" target="_blank">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Register Now!</span>
					</span>
					</a>
								</div>
				<div class="elementor-element elementor-element-ba97dc6 elementor-align-left elementor-tablet-align-left elementor-widget__width-auto elementor-widget elementor-widget-button" data-id="ba97dc6" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-sm" href="https://tekday.partek.ca/#speakers" target="_blank">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Speaker Line-up</span>
					</span>
					</a>
								</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-8455f05 elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel" data-id="8455f05" data-element_type="widget" data-e-type="widget" id="slide" data-settings="{&quot;slides_to_show&quot;:&quot;2&quot;,&quot;slides_to_scroll&quot;:&quot;1&quot;,&quot;navigation&quot;:&quot;dots&quot;,&quot;autoplay_speed&quot;:3000,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}" data-widget_type="image-carousel.default">
							<div class="elementor-image-carousel-wrapper swiper" role="region" aria-roledescription="carousel" aria-label="Image Carousel" dir="ltr">
			<div class="elementor-image-carousel swiper-wrapper" aria-live="off">
								<div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="1 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-100.jpg" alt="Artboard-1-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="2 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-3-100.jpg" alt="Artboard-1-copy-3-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="3 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-5-100.jpg" alt="Artboard-1-copy-5-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="4 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-11-100.jpg" alt="Artboard-1-copy-11-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="5 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-6-100.jpg" alt="Artboard-1-copy-6-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="6 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-9-100.jpg" alt="Artboard-1-copy-9-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="7 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-2-100.jpg" alt="Artboard-1-copy-2-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="8 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-10-100.jpg" alt="Artboard-1-copy-10-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="9 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-8-100.jpg" alt="Artboard-1-copy-8-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="10 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-4-100.jpg" alt="Artboard-1-copy-4-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="11 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-7-100.jpg" alt="Artboard-1-copy-7-100.jpg" /></figure></div><div class="swiper-slide" role="group" aria-roledescription="slide" aria-label="12 of 12"><figure class="swiper-slide-inner"><img decoding="async" class="swiper-slide-image" src="https://partek.ca/wp-content/uploads/2025/09/Artboard-1-copy-100.jpg" alt="Artboard-1-copy-100.jpg" /></figure></div>			</div>
							
									<div class="swiper-pagination"></div>
									</div>
						</div>
				</div>
				</div>
				</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/tekday-2025/">TEKDAY 2025</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Medicine Hat Stampede BBQ Fundraiser &#8211; Hosted by Partek IT Solutions</title>
		<link>https://partek.ca/medicine-hat-stampede-bbq-fundraiser-hosted-by-partek-it-solutions/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 10 Jul 2025 20:01:30 +0000</pubDate>
				<category><![CDATA[Community Involvement]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=33389</guid>

					<description><![CDATA[<p>Stampede Parade BBQ Fundraiser Hosted by Partek IT Solutions Join us during the Stampede Parade for a BBQ Fundraiser hosted by Partek IT Solutions — all in support of CORE Association&#8216;s group home for adults with autism!   Hot Dog: $3 Pop/Water: $2 Cash only 132 4th Ave SE, across from the @mhpubliclibrary July 24th, [&#8230;]</p>
<p>The post <a href="https://partek.ca/medicine-hat-stampede-bbq-fundraiser-hosted-by-partek-it-solutions/">Medicine Hat Stampede BBQ Fundraiser &#8211; Hosted by Partek IT Solutions</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="33389" class="elementor elementor-33389">
				<div class="elementor-element elementor-element-c29ba26 e-flex e-con-boxed e-con e-parent" data-id="c29ba26" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6326ec1 e-con-full e-flex e-con e-child" data-id="6326ec1" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9f1faa2 elementor-widget elementor-widget-image" data-id="9f1faa2" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="791" height="1024" src="https://partek.ca/wp-content/uploads/2025/07/Untitled-copy-2-791x1024.png" class="attachment-large size-large wp-image-33411" alt="" srcset="https://partek.ca/wp-content/uploads/2025/07/Untitled-copy-2-791x1024.png 791w, https://partek.ca/wp-content/uploads/2025/07/Untitled-copy-2-300x388.png 300w, https://partek.ca/wp-content/uploads/2025/07/Untitled-copy-2-768x994.png 768w, https://partek.ca/wp-content/uploads/2025/07/Untitled-copy-2-scaled.png 1978w" sizes="(max-width: 791px) 100vw, 791px" />															</div>
				</div>
		<div class="elementor-element elementor-element-15dbef6 e-con-full e-flex e-con e-child" data-id="15dbef6" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8acc6eb elementor-widget elementor-widget-heading" data-id="8acc6eb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Stampede Parade BBQ Fundraiser</h3>				</div>
				<div class="elementor-element elementor-element-f672af6 elementor-widget elementor-widget-heading" data-id="f672af6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Hosted by Partek IT Solutions</h4>				</div>
				<div class="elementor-element elementor-element-d859091 elementor-widget elementor-widget-text-editor" data-id="d859091" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto">Join us during the Stampede Parade for a BBQ Fundraiser hosted by Partek IT Solutions — all in support of <span class="html-span xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs"><a class="x1i10hfl xjbqb8w x1ejq31n x18oe1m7 x1sy0etr xstzfhl x972fbf x10w94by x1qhh985 x14e42zd x9f619 x1ypdohk xt0psk2 xe8uvvx xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x16tdsg8 x1hl2dhg xggy1nq x1a2a7pz xkrqix3 x1sur9pj x1fey0fg x1s688f" tabindex="0" role="link" href="https://www.facebook.com/COREAssociation?__cft__[0]=AZWcnhHWlkYGGWGdPwE7LffXiBq0b_T-rDA3dLW9Fpf5HRGGb938oX_sI-V6qCgj8YMvM-4qkQ8vvcYouV1BLBAAsviQAdzrS6sqkNIYdonBFy5LfRmU8oDtbSsC5WAyxCYO9Ggq5xlZTzqw1OufBOYD6rSRlKVV7HCgRwKb1_Bh-YzzEAv60OvHHo0AK-iTvcNSVtqFKxpq0iJ5x3G9t65r&amp;__tn__=-]K-R"><span class="xt0psk2"><span class="xjp7ctv">CORE Association</span></span></a></span>&#8216;s group home for adults with autism! <span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/tb/2/16/1f499.png" alt="💙" width="16" height="16" /></span></div><div dir="auto"> </div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto" style="padding-left: 40px;"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/t1c/2/16/1f32d.png" alt="🌭" width="16" height="16" /></span> Hot Dog: $3</div><div dir="auto" style="padding-left: 40px;"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/tee/2/16/1f964.png" alt="🥤" width="16" height="16" /></span> Pop/Water: $2</div><div dir="auto" style="padding-left: 40px;"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/t7e/2/16/1f4b5.png" alt="💵" width="16" height="16" /></span> Cash only</div><div dir="auto" style="padding-left: 40px;"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/tcc/2/16/1f4cd.png" alt="📍" width="16" height="16" /></span> 132 4th Ave SE, across from the <span class="html-span xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs"><a class="x1i10hfl xjbqb8w x1ejq31n x18oe1m7 x1sy0etr xstzfhl x972fbf x10w94by x1qhh985 x14e42zd x9f619 x1ypdohk xt0psk2 xe8uvvx xdj266r x14z9mp xat24cr x1lziwak xexx8yu xyri2b x18d9i69 x1c1uobl x16tdsg8 x1hl2dhg xggy1nq x1a2a7pz xkrqix3 x1sur9pj x1fey0fg x1s688f" tabindex="0" role="link" href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F_u%2Fmhpubliclibrary%3Ffbclid%3DIwZXh0bgNhZW0CMTAAYnJpZBExeW9rejhiazNSWkJVc2Y2eQEeaGQX5GkxBcOG9q8fW9r6jQXvuaopBxF5WRRlzFNlUI69o3SGbmfLW5uAKgU_aem_xu3Mth_4LyG3VMrapC6M2w&amp;h=AT1uXwpajv2OZxQMBd23c5KqROEhBurrVsfoieXqyM2fjhBPPx_axTab6AQ-GscFyxbfBkTokdnerhS-iXUQEQlp3WnQ0XMAJTiUzCIvS0N0nt4a3vTvOVGC-6uTyiD6D97ZqyJciw&amp;__tn__=-UK-R&amp;c[0]=AT1rzWHcEzOaOqdX5ZEv3MvTu41NlWxUgGBaSvsdAvZ2Lv6eQUO2BTfxGJ5mGBZTkbMWSEfinQq79GdosYJIpQWSxHTq6J2ujiS_k0jvkwbd6H7lRsBnLOjumEq66hj5bxEt7HEXZe2DvlGGwKzr7ingfzycCOO5TfrA6KA768lJXP4vIhn8qxVb6h8PcGP6X-GcN-eeSTP1GD6-b5-gMnmyR-fs" target="_blank" rel="nofollow noopener noreferrer">@mhpubliclibrary</a></span></div><div dir="auto" style="padding-left: 40px;"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/t4f/2/16/1f558.png" alt="🕘" width="16" height="16" /></span> July 24th, 2025, during and after the Stampede Parade.</div><div dir="auto"> </div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto"><span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/t4f/2/16/1f3af.png" alt="🎯" width="16" height="16" /></span> 100% of proceeds go directly to CORE Association&#8217;s New Group Home to help build a safe, supportive space where adults with autism can live independently and thrive.</div></div><div class="x14z9mp xat24cr x1lziwak x1vvkbs xtlvy1s x126k92a"><div dir="auto">Let&#8217;s come together, enjoy some great food, and support a great cause! <span class="html-span xexx8yu xyri2b x18d9i69 x1c1uobl x1hl2dhg x16tdsg8 x1vvkbs x3nfvp2 x1j61x8r x1fcty0u xdj266r xat24cr xm2jcoa x1mpyi22 xxymvpz xlup9mm x1kky2od"><img loading="lazy" decoding="async" class="xz74otr x15mokao x1ga7v0g x16uus16 xbiv7yw" src="https://static.xx.fbcdn.net/images/emoji.php/v9/t3/2/16/1f91d.png" alt="🤝" width="16" height="16" /></span></div></div>								</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/medicine-hat-stampede-bbq-fundraiser-hosted-by-partek-it-solutions/">Medicine Hat Stampede BBQ Fundraiser &#8211; Hosted by Partek IT Solutions</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Partek Achieves Sophos Platinum Partner Status</title>
		<link>https://partek.ca/partek-achieves-sophos-platinum-partner-status/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 16:36:40 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=33016</guid>

					<description><![CDATA[<p>There’s a silent problem affecting websites today—and it could be costing your business leads without you even knowing. </p>
<p>The post <a href="https://partek.ca/partek-achieves-sophos-platinum-partner-status/">Partek Achieves Sophos Platinum Partner Status</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="33016" class="elementor elementor-33016">
				<div class="elementor-element elementor-element-bd97924 e-flex e-con-boxed e-con e-parent" data-id="bd97924" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3f97386 e-con-full e-flex e-con e-child" data-id="3f97386" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-583b030 elementor-widget elementor-widget-image" data-id="583b030" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="215" height="100" src="https://partek.ca/wp-content/uploads/2025/06/sophos-global-partner-program-platinum.svg" class="attachment-full size-full wp-image-33020" alt="" />															</div>
				<div class="elementor-element elementor-element-09c9487 elementor-widget elementor-widget-heading" data-id="09c9487" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Partek Achieves Sophos Platinum Partner Status</h3>				</div>
				<div class="elementor-element elementor-element-429a8b6 elementor-widget elementor-widget-heading" data-id="429a8b6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">We’re thrilled to announce that Partek IT Solutions is now a Sophos Platinum Partner — a top-tier recognition awarded to a select group of IT providers who demonstrate deep expertise, commitment to cybersecurity excellence, and a proven track record of delivering outstanding value to clients using Sophos products.</h5>				</div>
				<div class="elementor-element elementor-element-da4d18b elementor-widget elementor-widget-text-editor" data-id="da4d18b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="flex max-w-full flex-col flex-grow"><div class="min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="018b14b8-8d3e-4b5d-9678-c625acc087ea"><div class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"><div class="markdown prose w-full break-words dark:prose-invert dark"><p data-start="677" data-end="1028">Sophos, a global leader in next-generation cybersecurity, offers a rigorous Partner Program that recognizes IT providers based on their technical competency, sales performance, and ability to deliver exceptional cybersecurity solutions. Platinum is the highest level of Sophos partnership, earned only by those who consistently go above and beyond in:</p><ul data-start="1030" data-end="1166"><li data-start="1030" data-end="1074"><p data-start="1032" data-end="1074"><strong data-start="1032" data-end="1074">Technical expertise and certifications</strong></p></li><li data-start="1075" data-end="1114"><p data-start="1077" data-end="1114"><strong data-start="1077" data-end="1114">Customer success and satisfaction</strong></p></li><li data-start="1115" data-end="1166"><p data-start="1117" data-end="1166"><strong data-start="1117" data-end="1166">Implementation of advanced security solutions</strong></p></li></ul><p data-start="1168" data-end="1275">Achieving Platinum status puts Partek among the most trusted and capable cybersecurity providers in Canada.</p></div></div></div></div>								</div>
				<div class="elementor-element elementor-element-256ff69 elementor-widget elementor-widget-heading" data-id="256ff69" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">At Partek, cybersecurity is not a checkbox — it’s a core part of everything we do. Whether you're looking to strengthen your existing defenses or build a security strategy from the ground up, our partnership with Sophos gives us the tools and insight to protect what matters most.
</h5>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-a97bb22 e-flex e-con-boxed e-con e-parent" data-id="a97bb22" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-cd4a4dc e-flex e-con-boxed e-con e-child" data-id="cd4a4dc" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-5a709c7 elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-widget elementor-widget-heading" data-id="5a709c7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Ready to elevate your cybersecurity with a proven partner?</h3>				</div>
				<div class="elementor-element elementor-element-69d2184 elementor-widget__width-initial elementor-widget-laptop__width-inherit elementor-widget elementor-widget-heading" data-id="69d2184" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Find out what smarter, simpler, and stronger security can look like — powered by Sophos and backed by Partek.
</h4>				</div>
				<div class="elementor-element elementor-element-6dccebc elementor-align-center elementor-widget elementor-widget-button" data-id="6dccebc" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/website-management/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Contact us</span>
					</span>
					</a>
								</div>
					</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/partek-achieves-sophos-platinum-partner-status/">Partek Achieves Sophos Platinum Partner Status</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Partek Partners with RUCKUS Networks to Deliver Smarter, Stronger Connectivity</title>
		<link>https://partek.ca/partek-partners-with-ruckus-networks-to-deliver-smarter-stronger-connectivity/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 16 Apr 2025 16:59:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=30061</guid>

					<description><![CDATA[<p>At Partek, we're always looking for new ways to help our clients work smarter, faster, and more securely. That’s why we’re excited to announce our new registered partnership with RUCKUS Networks, a global leader in wired and wireless networking solutions.</p>
<p>The post <a href="https://partek.ca/partek-partners-with-ruckus-networks-to-deliver-smarter-stronger-connectivity/">Partek Partners with RUCKUS Networks to Deliver Smarter, Stronger Connectivity</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="30061" class="elementor elementor-30061">
				<div class="elementor-element elementor-element-bd97924 e-flex e-con-boxed e-con e-parent" data-id="bd97924" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3f97386 e-con-full e-flex e-con e-child" data-id="3f97386" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-f59d122 e-con-full e-flex e-con e-child" data-id="f59d122" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-d4685ad e-con-full e-flex e-con e-child" data-id="d4685ad" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-47ac319 elementor-widget elementor-widget-image" data-id="47ac319" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
																<a href="https://www.ruckusnetworks.com/" target="_blank">
							<img loading="lazy" decoding="async" width="441" height="218" src="https://partek.ca/wp-content/uploads/2025/04/Ruckus_logo_black-orange.png.webp" class="attachment-large size-large wp-image-30062" alt="" srcset="https://partek.ca/wp-content/uploads/2025/04/Ruckus_logo_black-orange.png.webp 441w, https://partek.ca/wp-content/uploads/2025/04/Ruckus_logo_black-orange.png-300x148.webp 300w" sizes="(max-width: 441px) 100vw, 441px" />								</a>
															</div>
				</div>
		<div class="elementor-element elementor-element-2492a23 e-con-full e-flex e-con e-child" data-id="2492a23" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d026cb1 elementor-widget elementor-widget-heading" data-id="d026cb1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Partek Partners with RUCKUS Networks to Deliver Smarter, Stronger Connectivity</h3>				</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-da4d18b elementor-widget elementor-widget-text-editor" data-id="da4d18b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="flex max-w-full flex-col flex-grow"><div class="min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5" dir="auto" data-message-author-role="assistant" data-message-id="018b14b8-8d3e-4b5d-9678-c625acc087ea"><div class="flex w-full flex-col gap-1 empty:hidden first:pt-[3px]"><div class="markdown prose w-full break-words dark:prose-invert dark"><h4 class="elementToProof" data-ogsc="rgb(0, 0, 0)">At Partek, we&#8217;re always looking for new ways to help our clients work smarter, faster, and more securely. That’s why we’re excited to announce our new registered partnership with <b>RUCKUS Networks</b>, a global leader in wired and wireless networking solutions.</h4><h4 class="elementToProof" data-ogsc="rgb(0, 0, 0)">This partnership unlocks a new level of connectivity for our clients — delivering <b>high-performance Wi-Fi, advanced network security, and scalable solutions</b> designed to meet the demands of modern businesses, schools, municipalities, and more.</h4></div></div></div></div>								</div>
				<div class="elementor-element elementor-element-f50c686 elementor-widget elementor-widget-heading" data-id="f50c686" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Why RUCKUS?</h4>				</div>
				<div class="elementor-element elementor-element-becb16c elementor-widget elementor-widget-text-editor" data-id="becb16c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="elementToProof" data-ogsc="rgb(0, 0, 0)">RUCKUS is known for its <b>innovative, enterprise-grade wireless access points, switches, and cloud-managed networking tools</b>. Whether you&#8217;re looking to improve connectivity across a large building, support high-density device usage, or enable seamless roaming and secure access, RUCKUS solutions deliver:</div><div data-ogsc="rgb(0, 0, 0)"> </div><ul data-start="1106" data-end="1308"><li data-ogsc="rgb(0, 0, 0)"><div><b>Superior Wi-Fi coverage and performance</b></div></li><li data-ogsc="rgb(0, 0, 0)"><div><b>Smart network automation and AI-powered management</b></div></li><li data-ogsc="rgb(0, 0, 0)"><div><b>Scalability for organizations of all sizes</b></div></li><li data-ogsc="rgb(0, 0, 0)"><div><b>Robust security built into every layer</b></div></li></ul>								</div>
				<div class="elementor-element elementor-element-2103357 elementor-widget elementor-widget-text-editor" data-id="2103357" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4 class="elementToProof" data-ogsc="rgb(0, 0, 0)">From the classroom to the boardroom, we now have the ability to deliver next-generation networking solutions that keep your people connected and productive — no matter where they are.</h4><h4 class="elementToProof" data-ogsc="rgb(0, 0, 0)">This partnership is another step forward in our mission to deliver best-in-class technology solutions that drive real business results.</h4>								</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-a97bb22 e-flex e-con-boxed e-con e-parent" data-id="a97bb22" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-cd4a4dc e-con-full e-flex e-con e-child" data-id="cd4a4dc" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-28b5c6a elementor-widget elementor-widget-spacer" data-id="28b5c6a" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				<div class="elementor-element elementor-element-5a709c7 elementor-widget__width-initial elementor-widget elementor-widget-heading" data-id="5a709c7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Want to learn more about how RUCKUS could improve your network? </h3>				</div>
				<div class="elementor-element elementor-element-89abc77 elementor-widget__width-initial elementor-widget elementor-widget-heading" data-id="89abc77" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Contact us today for a free consultation.</h4>				</div>
				<div class="elementor-element elementor-element-6dccebc elementor-align-center elementor-widget elementor-widget-button" data-id="6dccebc" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Contact us</span>
					</span>
					</a>
								</div>
				<div class="elementor-element elementor-element-15117e1 elementor-widget elementor-widget-spacer" data-id="15117e1" data-element_type="widget" data-e-type="widget" data-widget_type="spacer.default">
							<div class="elementor-spacer">
			<div class="elementor-spacer-inner"></div>
		</div>
						</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/partek-partners-with-ruckus-networks-to-deliver-smarter-stronger-connectivity/">Partek Partners with RUCKUS Networks to Deliver Smarter, Stronger Connectivity</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Partek Sponsors a Library Card for Every Hatter Program!</title>
		<link>https://partek.ca/partek-sponsors-a-library-card-for-every-hatter-program/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 15 Aug 2024 22:13:03 +0000</pubDate>
				<category><![CDATA[Community Involvement]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=28711</guid>

					<description><![CDATA[<p>Partek sponsors a Library Card for Every Hatter Program through the Medicine Hat Public Library for the back-to-school season!</p>
<p>The post <a href="https://partek.ca/partek-sponsors-a-library-card-for-every-hatter-program/">Partek Sponsors a Library Card for Every Hatter Program!</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="28711" class="elementor elementor-28711">
				<div class="elementor-element elementor-element-4371fc4 e-flex e-con-boxed e-con e-parent" data-id="4371fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6cfc3e8 e-con-full e-flex e-con e-child" data-id="6cfc3e8" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6df4aa8 elementor-widget elementor-widget-heading" data-id="6df4aa8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Partek Sponsors:</h4>				</div>
				<div class="elementor-element elementor-element-89a5131 elementor-widget elementor-widget-heading" data-id="89a5131" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">A Library Card for Every Hatter Program </h3>				</div>
		<div class="elementor-element elementor-element-956b662 e-con-full e-flex e-con e-child" data-id="956b662" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-2daf9a4 e-con-full e-flex e-con e-child" data-id="2daf9a4" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d7e50ab elementor-widget__width-initial elementor-widget elementor-widget-image" data-id="d7e50ab" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="590" height="1024" src="https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1-590x1024.jpg" class="attachment-large size-large wp-image-28714" alt="" srcset="https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1-590x1024.jpg 590w, https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1-300x521.jpg 300w, https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1-768x1333.jpg 768w, https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1-885x1536.jpg 885w, https://partek.ca/wp-content/uploads/2024/08/Artboard-4-1.jpg 1106w" sizes="(max-width: 590px) 100vw, 590px" />															</div>
				</div>
		<div class="elementor-element elementor-element-25baa0f e-con-full e-flex e-con e-child" data-id="25baa0f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8122a5f elementor-widget__width-auto elementor-widget elementor-widget-text-editor" data-id="8122a5f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>At Partek, we believe in the power of education and access to resources. That’s why we’re proud to sponsor FREE library cards for the <a href="https://mhpl.shortgrass.ca/i-want-to/donate-or-volunteer/library-card-for-every-hatter" target="_blank" rel="noopener">Library Card for Every Hatter Program</a> at the Medicine Hat Public Library this month!</h4><div class="xdj266r x11i5rnm xat24cr x1mh8g0r x1vvkbs x126k92a"><p>Partek&#8217;s roots with the Medicine Hat Public Library run deep; Early in his career, James, our CEO, managed the IT at Medicine Hat Public Library. Our VP, Levi, also worked in IT with the Shortgrass Library System before joining Partek. And as a company, we currently manage IT for the Shortgrass Library System!</p></div><div class="xdj266r x11i5rnm xat24cr x1mh8g0r x1vvkbs x126k92a">Our roots with the <a href="https://mhpl.shortgrass.ca/" target="_blank" rel="noopener">Medicine Hat Public Library </a>and  <a href="https://shortgrass.ca/" target="_blank" rel="noopener">Shortgrass Library System</a> has kept us closely connected, and sponsoring library cards is our way of giving back to the community and facilities that helped shape our careers in IT.</div><div> </div><h4>Stop by the <a tabindex="0" role="link" href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.instagram.com%2F_u%2Fmhpubliclibrary%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0P3jouFFFU1MxbZ0Pufq03ZgCRMgv1i7DdTDcSn--YSlynnImm0NCyTOM_aem_22TyNbOUSpnRve0esaHaKw&amp;h=AT1g0XpD3sa_zmksozBOgoCYLiMiWb9JW56X3AtcuB5dbrOGOXXtl2_nlbpnvhpx6kDKT9xgphRnnHGSjmDmvJo3B9MlTudHoFXcBBpAQtt--QdGPs07kQY8BXU0egLRdNqOVY9ntQ&amp;__tn__=-UK-R&amp;c[0]=AT1l4ywGdeBt_eS1SvRd_vy0Y3O0ToPWiK5NUadEIz6XeSEo5PkzSLOFO7KU31Fr9ew7LQSysaS-D9wSgLDLtZX40THpwKzATIJ0fd8KOQb81oSyn0DIvt07Ce0p8kjLPqQdib8LYCelL6wKTC4PLsgCySlsMreNKMz9jzl830FvPeMruV8nAedSY1BdbdtO6J-aUrXfL9jL1_w6FtWExh3pc5g4Cl7dZq-pWl4G9mIvqdG25w" target="_blank" rel="nofollow noopener noreferrer">@mhpubliclibrary</a> to get your FREE Library Card!</h4>								</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-da8831e e-con-full e-flex e-con e-child" data-id="da8831e" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-5d5087b e-con-full e-flex e-con e-child" data-id="5d5087b" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
				<div class="elementor-element elementor-element-d7c11e1 elementor-widget elementor-widget-text-editor" data-id="d7c11e1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Here&#8217;s what the <a href="https://mhpl.shortgrass.ca/" target="_blank" rel="noopener">Medicine Hat Public Library</a> had to say about our sponsorship!:</h4>								</div>
				<div class="elementor-element elementor-element-c774c08 elementor-view-default elementor-widget elementor-widget-icon" data-id="c774c08" data-element_type="widget" data-e-type="widget" data-widget_type="icon.default">
							<div class="elementor-icon-wrapper">
			<div class="elementor-icon">
			<i aria-hidden="true" class="icon icon-quote"></i>			</div>
		</div>
						</div>
				<div class="elementor-element elementor-element-55a76d4 elementor-widget elementor-widget-text-editor" data-id="55a76d4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Partek IT Solutions is used to finding solutions in the IT world for businesses and organizations all over western Canada. Through MHPL’s A Library Card for Every Hatter program, the company is also part of the solution for giving Medicine Hat families access to all that the library has to offer, physically and digitally.</h5><p>CEO James Parsons and <a title="https://shortgrass.us11.list-manage.com/track/click?u=9cc3ea6503e2d0cb9b4aac4b3&amp;id=db1d92adde&amp;e=91042924d1" href="https://shortgrass.us11.list-manage.com/track/click?u=9cc3ea6503e2d0cb9b4aac4b3&amp;id=db1d92adde&amp;e=91042924d1" target="_blank" rel="noopener" data-ogsc="" data-outlook-id="cffbe38f-f434-40c2-a734-343ff3dcddda"><span data-ogsc="rgb(238, 67, 67)">Partek</span></a> recognize the importance of digital literacy and access to technology in today’s world. He says libraries play a crucial role in providing access to information, educational resources and technological resources.</p><p><em>“Libraries are vital hubs for digital access, from providing public computers to offering online databases, and we’re proud to support this mission. By sponsoring the program, we aim to ensure that more residents of Medicine Hat can benefit from these valuable services and resources,”</em> he says.</p><p>The $1,000 sponsorship from Partek makes library cards FREE for 200 adults in Medicine Hat (cards for kids are always free).</p><p>Parsons says Medicine Hat Public Library represents a gateway to knowledge and — with our wide range of programs and resources that cater to all age groups — is a cornerstone of our community. In particular and unsurprisingly, he sees the library as a beacon of digital inclusivity.</p><p><em>“It’s more than just a place for books — it’s a critical resource for anyone needing access to technology, whether for education, job searching or staying connected in an increasingly digital world. The library embodies the value of technology as a tool for personal and community growth, accessible education, and the value of nurturing a well-informed and connected community.”</em></p><p>Visit the library to get your FREE card or <a title="https://shortgrass.us11.list-manage.com/track/click?u=9cc3ea6503e2d0cb9b4aac4b3&amp;id=f607fd2623&amp;e=91042924d1" href="https://shortgrass.us11.list-manage.com/track/click?u=9cc3ea6503e2d0cb9b4aac4b3&amp;id=f607fd2623&amp;e=91042924d1" data-ogsc="" data-outlook-id="02835425-71f1-4ef2-a6de-c145cf65b8b8"><span data-ogsc="rgb(238, 67, 67)">renew it online</span></a>. </p>								</div>
				</div>
				</div>
				</div>
					</div>
				</div>
				</div>
		<p>The post <a href="https://partek.ca/partek-sponsors-a-library-card-for-every-hatter-program/">Partek Sponsors a Library Card for Every Hatter Program!</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Human Factor: How Cybercriminals Exploit Human Behavior to Breach Security</title>
		<link>https://partek.ca/the-human-factor-how-cybercriminals-exploit-human-behavior-to-breach-security/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 26 Jun 2024 12:00:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27945</guid>

					<description><![CDATA[<p>Cyber criminals and threat actors often don’t need to work that hard. The easiest way to breach cybersecurity is by exploiting the human factor.</p>
<p>The post <a href="https://partek.ca/the-human-factor-how-cybercriminals-exploit-human-behavior-to-breach-security/">The Human Factor: How Cybercriminals Exploit Human Behavior to Breach Security</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27945" class="elementor elementor-27945">
				<div class="elementor-element elementor-element-4371fc4 e-flex e-con-boxed e-con e-parent" data-id="4371fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6cfc3e8 e-con-full e-flex e-con e-child" data-id="6cfc3e8" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6df4aa8 elementor-widget elementor-widget-heading" data-id="6df4aa8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Human Factor:</h4>				</div>
				<div class="elementor-element elementor-element-89a5131 elementor-widget elementor-widget-heading" data-id="89a5131" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">How Cybercriminals Exploit Human Behavior to Breach Security</h3>				</div>
		<div class="elementor-element elementor-element-956b662 e-con-full e-flex e-con e-child" data-id="956b662" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-f482362 elementor-widget elementor-widget-text-editor" data-id="f482362" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Imagine a successful cyberattack against your organization. It might involve a sophisticated piece of social engineering, a convincing lure that catches the recipient off guard. Or perhaps a clever technical exploit that bypasses your defenses. </h5><h5><strong>In reality, threat actors often don’t need to work that hard. The easiest way to breach security is by exploiting the human factor.</strong></h5>								</div>
				</div>
		<div class="elementor-element elementor-element-da8831e e-con-full e-flex e-con e-child" data-id="da8831e" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-5d5087b e-con-full e-flex e-con e-child" data-id="5d5087b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d7c11e1 elementor-widget elementor-widget-text-editor" data-id="d7c11e1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>People are essential to any robust defense strategy, yet they often represent the weakest link. Mistakes, falling for scams, or neglecting security best practices are common pitfalls. When forced to choose between convenience and security, users almost always opt for convenience. <strong>How can organizations shift this behavior? </strong></p>								</div>
				<div class="elementor-element elementor-element-96bcdfd elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="96bcdfd" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">71% of working adults admitted to engaging in risky behavior, such as reusing or sharing passwords, clicking on links from unknown senders, or providing credentials to untrustworthy sources.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Alarmingly, 96% of these individuals knew they were taking risks.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-55a76d4 elementor-widget elementor-widget-text-editor" data-id="55a76d4" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>In this article, we&#8217;ll explore how security attitudes influence real-world actions and how cybercriminals exploit our preference for speed and convenience. </p>								</div>
				</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-419ab1a e-flex e-con-boxed e-con e-parent" data-id="419ab1a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-331015d e-con-full e-flex e-con e-child" data-id="331015d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-eabf875 elementor-widget elementor-widget-heading" data-id="eabf875" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Security Behaviors and Attitudes</h4>				</div>
				<div class="elementor-element elementor-element-4c510da elementor-widget elementor-widget-text-editor" data-id="4c510da" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Even the best technical defenses can be undermined if users don’t follow basic security practices, like avoiding suspicious links, verifying sender identities, and using strong passwords.</h5>								</div>
		<div class="elementor-element elementor-element-7dd7563 e-flex e-con-boxed e-con e-child" data-id="7dd7563" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-596bf46 e-con-full e-flex e-con e-child" data-id="596bf46" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7c79f02 elementor-widget elementor-widget-image" data-id="7c79f02" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="1097" height="791" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.52.07-AM-e1716409167532.png" class="attachment-full size-full wp-image-27949" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.52.07-AM-e1716409167532.png 1097w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.52.07-AM-e1716409167532-300x216.png 300w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.52.07-AM-e1716409167532-1024x738.png 1024w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.52.07-AM-e1716409167532-768x554.png 768w" sizes="(max-width: 1097px) 100vw, 1097px" />															</div>
				</div>
		<div class="elementor-element elementor-element-a612f7b e-flex e-con-boxed e-con e-child" data-id="a612f7b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-e3826e1 elementor-widget elementor-widget-text-editor" data-id="e3826e1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Reasons for Risky Behavior</h4><p>Users take risks for various reasons, including convenience, time-saving, and urgency. This indicates that risky actions are often a conscious choice rather than a lack of awareness.</p><p>Cybercriminals exploit this knowledge, using social engineering in almost every email threat analyzed. 58% of users who take risky actions also engaged in behaviors susceptible to basic social engineering tactics, leading to ransomware, malware, data breaches, or financial loss.</p>								</div>
				<div class="elementor-element elementor-element-b64fdf8 elementor-widget elementor-widget-heading" data-id="b64fdf8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">Image Source: State of the Phish, Proofpoint</a></h6>				</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-75f3d17 e-flex e-con-boxed e-con e-child" data-id="75f3d17" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5486e14 e-con-full e-flex e-con e-child" data-id="5486e14" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-aa691b1 elementor-widget elementor-widget-heading" data-id="aa691b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">A Professional Perspective</h4>				</div>
				<div class="elementor-element elementor-element-ac950ac elementor-widget elementor-widget-text-editor" data-id="ac950ac" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>IT providers and Security Specialists have a distinct perspective on security risks compared to end users. We are acutely aware of the threat landscape and the severe consequences of breaches. Our nuanced understanding of the challenges in securing complex, dynamic environments positions us uniquely. We face the tough task of balancing robust security measures with the need for unhindered productivity and efficiency.</h5>								</div>
				<div class="elementor-element elementor-element-0ed2183 elementor-widget elementor-widget-text-editor" data-id="0ed2183" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank" rel="noopener">Survey Data</a> reveals that we see users with access to business-critical data as the biggest security risk (63%). This group is particularly challenging to manage due to the necessity of their access. Click-happy users and those who neglect security awareness training follow closely behind, each considered a significant risk by 56% of respondents.</p><p> </p>								</div>
				</div>
		<div class="elementor-element elementor-element-6682614 e-flex e-con-boxed e-con e-child" data-id="6682614" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0eda78f elementor-widget elementor-widget-image" data-id="0eda78f" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="346" height="287" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.34.15-PM-1.png" class="attachment-large size-large wp-image-27961" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.34.15-PM-1.png 346w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.34.15-PM-1-300x249.png 300w" sizes="(max-width: 346px) 100vw, 346px" />															</div>
				<div class="elementor-element elementor-element-ca8424e elementor-widget elementor-widget-heading" data-id="ca8424e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">Image Source: State of the Phish, Proofpoint</a></h6>				</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-254cd19 e-flex e-con-boxed e-con e-child" data-id="254cd19" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-c219a38 e-con-full e-flex e-con e-child" data-id="c219a38" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-5b9aff7 elementor-widget elementor-widget-text-editor" data-id="5b9aff7" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Alarmingly, data indicates a significant overlap between the riskiest behaviors identified by security professionals and the most common risky actions taken by end users.</h5><p>Behaviors such as reusing passwords, using work devices for personal activities, and accessing inappropriate websites are frequently cited by security teams as unsafe. These actions also appear among the top risky behaviors admitted by users. This overlap suggests that end users may not fully grasp how risky their actions are perceived by security teams.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-5029b19 e-con-full e-flex e-con e-child" data-id="5029b19" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-cda02b8 elementor-widget elementor-widget-image" data-id="cda02b8" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="800" height="496" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.31.20-PM.png" class="attachment-large size-large wp-image-27956" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.31.20-PM.png 809w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.31.20-PM-300x186.png 300w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.31.20-PM-768x477.png 768w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				<div class="elementor-element elementor-element-c15a6ab elementor-widget elementor-widget-heading" data-id="c15a6ab" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">Image Source: State of the Phish, Proofpoint</a></h6>				</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-ff5910c elementor-widget elementor-widget-heading" data-id="ff5910c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Security Awareness Trends</h4>				</div>
				<div class="elementor-element elementor-element-284ac25 elementor-widget elementor-widget-text-editor" data-id="284ac25" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Training alone isn’t enough to change unsafe behavior, but lacking basic security awareness tools and knowledge makes teams more vulnerable. Awareness programs must evolve to keep pace with new social engineering techniques.</h5>								</div>
		<div class="elementor-element elementor-element-2888a83 e-flex e-con-boxed e-con e-child" data-id="2888a83" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-2b44b34 e-con-full e-flex e-con e-child" data-id="2b44b34" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-ca3c8b7 e-flex e-con-boxed e-con e-child" data-id="ca3c8b7" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0ec8973 elementor-widget elementor-widget-image" data-id="0ec8973" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="396" height="391" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.42.58-PM.png" class="attachment-large size-large wp-image-27971" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.42.58-PM.png 396w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.42.58-PM-300x296.png 300w" sizes="(max-width: 396px) 100vw, 396px" />															</div>
				<div class="elementor-element elementor-element-035c5c7 elementor-widget elementor-widget-image" data-id="035c5c7" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="393" height="391" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.43.08-PM.png" class="attachment-large size-large wp-image-27972" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.43.08-PM.png 393w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.43.08-PM-300x298.png 300w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.43.08-PM-150x150.png 150w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.43.08-PM-120x120.png 120w" sizes="(max-width: 393px) 100vw, 393px" />															</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-c56b93d elementor-widget elementor-widget-heading" data-id="c56b93d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">Techniques included in security awareness training syllabuses. <br>Image Source: State of the Phish, Proofpoint</a></h6>				</div>
				</div>
		<div class="elementor-element elementor-element-1302da4 e-flex e-con-boxed e-con e-child" data-id="1302da4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-1d42d9d elementor-widget elementor-widget-text-editor" data-id="1d42d9d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Current State of Security Awareness</h4><p>The good news is that most modern businesses have some form of security awareness program. However, many struggle to drive real behavioral change.</p><p>Coverage and relevance of training topics are also challenges. While security professionals emphasize remote work, password hygiene, and internet safety, less than a third of programs cover all these areas. The most common training topics are malware, Wi-Fi security, ransomware, and email phishing. These are important but not comprehensive enough to address the full spectrum of risks.</p>								</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-de70da1 elementor-widget elementor-widget-heading" data-id="de70da1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Emerging Threats: TOAD, MFA-Bypass, QR Codes, and Generative AI</h4>				</div>
		<div class="elementor-element elementor-element-c7d3aef e-flex e-con-boxed e-con e-child" data-id="c7d3aef" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-b0d3228 e-con-full e-flex e-con e-child" data-id="b0d3228" data-element_type="container" data-e-type="container" data-settings="{&quot;background_background&quot;:&quot;gradient&quot;}">
				<div class="elementor-element elementor-element-668868a elementor-widget elementor-widget-image" data-id="668868a" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="800" height="682" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.50.39-PM-2.png" class="attachment-large size-large wp-image-27994" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.50.39-PM-2.png 845w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.50.39-PM-2-300x256.png 300w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-2.50.39-PM-2-768x654.png 768w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				<div class="elementor-element elementor-element-c045438 elementor-widget elementor-widget-heading" data-id="c045438" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank"> The most common forms of attack reported. 
 Image Source: State of the Phish, Proofpoint</a></h6>				</div>
				</div>
		<div class="elementor-element elementor-element-3bf58a6 e-flex e-con-boxed e-con e-child" data-id="3bf58a6" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-123e91a elementor-widget elementor-widget-text-editor" data-id="123e91a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Telephone-Oriented Attack Delivery (TOAD)</h4><p>TOAD attacks involve seemingly benign messages with a phone number. When the victim calls for help, the attack chain activates. Cybercriminal call centers guide victims into granting remote access or revealing sensitive information. On average, 10 million TOAD messages are sent monthly.</p><h4>MFA Bypass</h4><p>Despite being a cornerstone of corporate cybersecurity, MFA is not foolproof. Cybercriminals use proxy servers to intercept MFA tokens, bypassing this additional security layer. About 1 million phishing threats using the EvilProxy framework are seen monthly, with 89% of security professionals still viewing MFA as a silver bullet against account takeovers.</p><h4>QR Code Phishing</h4><p>QR codes are increasingly used in phishing to evade automated detection while presenting a familiar format to users. This technique is particularly dangerous as users can’t tell if a QR code is malicious just by looking at it.</p><h4>Generative AI</h4><p>Generative AI can create realistic content, enhancing social engineering in messaging-based attacks. It improves the quality of lures, especially in different languages, and poses data loss risks when data is uploaded to AI services like ChatGPT and Google Bard.</p>								</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-d4a0f7c elementor-widget elementor-widget-heading" data-id="d4a0f7c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Driving Behavior Change</h4>				</div>
				<div class="elementor-element elementor-element-e25b5a0 elementor-widget elementor-widget-text-editor" data-id="e25b5a0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>A security awareness program is crucial but not sufficient. Data shows that while users may know the risks, they often still engage in risky behaviors. The challenge is to change this behavior, making security easier and more user-friendly.</h5>								</div>
				<div class="elementor-element elementor-element-9a5e042 elementor-widget elementor-widget-text-editor" data-id="9a5e042" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Steps to Lead Behavior Change</h4>								</div>
				<div class="elementor-element elementor-element-f304ce9 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f304ce9" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text"><strong>Use Threat Intelligence:</strong> Inform users about the nature and impact of threats, tailoring programs to address specific risky behaviors.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text"><strong>Reduce Security Friction:</strong> Identify and alleviate bottlenecks in security processes to make compliance easier and less disruptive.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text"><strong>Go Beyond Training:</strong> Foster a strong security culture through better communication, engagement, and positive reinforcement.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-2c04ff9 elementor-widget elementor-widget-text-editor" data-id="2c04ff9" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>By integrating these strategies, organizations can enhance their security posture and reduce the likelihood of successful cyber attacks. Contact us today to learn how we can help protect your organization from evolving threats.</p>								</div>
				<div class="elementor-element elementor-element-e97e5c7 elementor-widget elementor-widget-image" data-id="e97e5c7" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="1325" height="571" src="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.55.31-AM-e1716410911207.png" class="attachment-full size-full wp-image-27976" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.55.31-AM-e1716410911207.png 1325w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.55.31-AM-e1716410911207-300x129.png 300w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.55.31-AM-e1716410911207-1024x441.png 1024w, https://partek.ca/wp-content/uploads/2024/05/Screen-Shot-2024-05-22-at-11.55.31-AM-e1716410911207-768x331.png 768w" sizes="(max-width: 1325px) 100vw, 1325px" />															</div>
				<div class="elementor-element elementor-element-cbf634e elementor-widget elementor-widget-heading" data-id="cbf634e" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-state-of-the-phish-2024.pdf" target="_blank">Image Source: State of the Phish, Proofpoint</a></h6>				</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Take Action to Strengthen Your Security Posture</h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Don't let your organization fall victim to preventable security risks. Empower your team with the knowledge and tools they need to stay vigilant. Contact us today to learn how our comprehensive security awareness training and cutting-edge cybersecurity solutions can protect your business from evolving threats.</h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Get in Touch</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/the-human-factor-how-cybercriminals-exploit-human-behavior-to-breach-security/">The Human Factor: How Cybercriminals Exploit Human Behavior to Breach Security</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Ways Cybercriminals are using AI</title>
		<link>https://partek.ca/5-ways-cybercriminals-are-using-ai/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 19 Jun 2024 12:00:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27935</guid>

					<description><![CDATA[<p>From phishing and deepfakes to malware generation and content localization, AI is being used in numerous ways to breach security defenses. </p>
<p>The post <a href="https://partek.ca/5-ways-cybercriminals-are-using-ai/">5 Ways Cybercriminals are using AI</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27935" class="elementor elementor-27935">
				<div class="elementor-element elementor-element-4371fc4 e-flex e-con-boxed e-con e-parent" data-id="4371fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6cfc3e8 e-con-full e-flex e-con e-child" data-id="6cfc3e8" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6df4aa8 elementor-widget elementor-widget-heading" data-id="6df4aa8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">What You Need to Know:</h4>				</div>
				<div class="elementor-element elementor-element-89a5131 elementor-widget elementor-widget-heading" data-id="89a5131" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">5 Ways Cybercriminals are Using AI</h3>				</div>
		<div class="elementor-element elementor-element-da8831e e-con-full e-flex e-con e-child" data-id="da8831e" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-956b662 e-con-full e-flex e-con e-child" data-id="956b662" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-f482362 elementor-widget elementor-widget-text-editor" data-id="f482362" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Modern cybercriminals are leveraging artificial intelligence (AI) to enhance their attacks. From phishing and deepfakes to malware generation and content localization, AI is being used in numerous ways to breach security defenses. </h5>								</div>
				<div class="elementor-element elementor-element-0567c0f elementor-widget elementor-widget-heading" data-id="0567c0f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Let's delve into how cybercriminals use AI to steal credentials and gain unauthorized access to high-value networks:</h5>				</div>
				</div>
				</div>
		<div class="elementor-element elementor-element-9ae7b8a e-con-full e-flex e-con e-child" data-id="9ae7b8a" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-9e04162 e-con-full e-flex e-con e-child" data-id="9e04162" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b0b450 elementor-widget elementor-widget-heading" data-id="7b0b450" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Value of Stolen Credentials</h4>				</div>
				<div class="elementor-element elementor-element-bad9fcf elementor-widget elementor-widget-text-editor" data-id="bad9fcf" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Stolen credentials, especially current and working sets of usernames and passwords, are invaluable to cybercriminals. These credentials enable them to access systems and take over accounts with a reduced risk of triggering threat alerts. Once inside, they often engage in network reconnaissance, privilege escalation, data exfiltration, and other preparatory steps for further attacks. This could lead to ransomware deployment or the establishment of an advanced persistent threat (APT), such as the notorious Volt Typhoon.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-b1b3f40 e-con-full e-flex e-con e-child" data-id="b1b3f40" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9987aef elementor-widget elementor-widget-heading" data-id="9987aef" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">AI-Powered Password-Based Attacks</h4>				</div>
				<div class="elementor-element elementor-element-58d4597 elementor-widget elementor-widget-text-editor" data-id="58d4597" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Cybercriminals don&#8217;t solely rely on stolen credentials. They also employ various methods to compromise remote access points or guess credentials. Here are some common tactics:</p>								</div>
				<div class="elementor-element elementor-element-57c6cfe elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="57c6cfe" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Credential Stuffing: Using stolen credentials from one breach to access multiple accounts, exploiting the common practice of reusing passwords across different services.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Password Spraying: Automated attempts to match a few common passwords across many usernames, particularly effective against cloud services and remote access points.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Brute Force Attacks: Automated processes that guess passwords using all possible combinations of characters, often starting with known default usernames and passwords.</span>
									</li>
						</ul>
						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-775cfe0 elementor-widget elementor-widget-heading" data-id="775cfe0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">This data underscores the relentless efforts of cybercriminals to exploit vulnerabilities and access sensitive information. What are the main drivers of this increase? </h4>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-419ab1a e-flex e-con-boxed e-con e-parent" data-id="419ab1a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-331015d e-con-full e-flex e-con e-child" data-id="331015d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-eabf875 elementor-widget elementor-widget-heading" data-id="eabf875" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">How AI Enhances Credential Theft:</h4>				</div>
		<div class="elementor-element elementor-element-a7095bf e-flex e-con-boxed e-con e-child" data-id="a7095bf" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-8010eae e-flex e-con-boxed e-con e-child" data-id="8010eae" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4c510da elementor-widget elementor-widget-text-editor" data-id="4c510da" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Phishing and Social Engineering</strong></h5><p>AI can generate highly convincing phishing emails that mimic legitimate communications. These emails can be personalized based on data analysis, making them more likely to deceive recipients into providing their credentials or granting system access.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-0aa6f57 e-flex e-con-boxed e-con e-child" data-id="0aa6f57" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-7ea5c38 elementor-widget elementor-widget-text-editor" data-id="7ea5c38" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Deepfakes</strong></h5><p>AI is used to create realistic videos or audio clips that impersonate trusted figures. For instance, in 2019, a voice-phishing (vishing) attack used a deepfake to convince an employee to transfer $243,000. More recently, a group of deepfake bank employees used a Zoom call to steal $35 million.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-ddc4f78 e-flex e-con-boxed e-con e-child" data-id="ddc4f78" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0df028b elementor-widget elementor-widget-text-editor" data-id="0df028b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Malware Development</strong></h5><p>Generative AI (GenAI) can create &#8216;smart&#8217; malware that adapts its code to evade detection by traditional security systems. Such malware is often used to steal credentials and other sensitive information from infected systems.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-6c48893 e-flex e-con-boxed e-con e-child" data-id="6c48893" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-123e4e2 elementor-widget elementor-widget-text-editor" data-id="123e4e2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Automated Reconnaissance</strong></h5><p>AI enables quick data processing, allowing cybercriminals to identify targets and vulnerabilities rapidly. They can scan and map networks, gather information from public sources (OSINT), and identify misconfigurations and other vulnerabilities.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-b1088bb e-flex e-con-boxed e-con e-child" data-id="b1088bb" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-c5f76bc elementor-widget elementor-widget-text-editor" data-id="c5f76bc" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>AI Chatbots</strong></h5><p>Threat actors deploy AI chatbots to automate social engineering attacks, such as phishing or pretexting, increasing the scale and efficiency of their operations.</p>								</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-aa236a1 elementor-widget elementor-widget-heading" data-id="aa236a1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Protecting Against AI-Powered Attacks</h4>				</div>
				<div class="elementor-element elementor-element-d2fa357 elementor-widget elementor-widget-text-editor" data-id="d2fa357" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Defending against AI-enhanced credential theft requires a combination of strong security policies, user education, and advanced security solutions. Here are some key measures:</p>								</div>
		<div class="elementor-element elementor-element-1aa2670 e-flex e-con-boxed e-con e-child" data-id="1aa2670" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-326b350 e-flex e-con-boxed e-con e-child" data-id="326b350" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-a1f71f1 elementor-widget elementor-widget-text-editor" data-id="a1f71f1" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Use Strong, Unique Passwords</strong></h5><p>Employ a password manager to generate and store complex passwords, ensuring that each account has a unique password.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-7977e9d e-flex e-con-boxed e-con e-child" data-id="7977e9d" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-9634929 elementor-widget elementor-widget-text-editor" data-id="9634929" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Enable Multi-Factor Authentication (MFA)</strong></h5><p>MFA adds an extra layer of security by requiring a second form of verification, such as a device or hardware token, in addition to the username and password.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-21032f9 e-flex e-con-boxed e-con e-child" data-id="21032f9" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-e6db0ca elementor-widget elementor-widget-text-editor" data-id="e6db0ca" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Monitor for Phishing Attacks</strong></h5><p>Always verify the source of emails and be cautious with emails requesting sensitive information or containing links.</p>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-96526cd e-flex e-con-boxed e-con e-child" data-id="96526cd" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5781e7c e-flex e-con-boxed e-con e-child" data-id="5781e7c" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-cb3f641 elementor-widget elementor-widget-text-editor" data-id="cb3f641" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Update and Patch Systems</strong></h5><p>Regularly update software and apply security patches promptly to protect against vulnerabilities that AI-powered scans might exploit.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-47e35db e-flex e-con-boxed e-con e-child" data-id="47e35db" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-d3d87cb elementor-widget elementor-widget-text-editor" data-id="d3d87cb" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Use AI-Powered Security Tools</strong></h5><p>Implement comprehensive network and endpoint protection with AI-powered security solutions to detect unusual activity and unexpected network traffic.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-45663fa e-flex e-con-boxed e-con e-child" data-id="45663fa" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-e8f08cf elementor-widget elementor-widget-text-editor" data-id="e8f08cf" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Educate Yourself and Others</strong></h5><p>Conduct security awareness campaigns to teach employees how to recognize and defend against email threats, AI-powered attacks, and social engineering.</p>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-9f0e33b e-flex e-con-boxed e-con e-child" data-id="9f0e33b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-3c22cb8 e-flex e-con-boxed e-con e-child" data-id="3c22cb8" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-103ff96 elementor-widget elementor-widget-text-editor" data-id="103ff96" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Monitor Account Activity</strong></h5><p>Regularly check your accounts and set up alerts for unusual activity to detect potential breaches early.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-0e4f4a4 e-flex e-con-boxed e-con e-child" data-id="0e4f4a4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-a8632d6 elementor-widget elementor-widget-text-editor" data-id="a8632d6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Use Secure Connections</strong></h5><p>Avoid accessing sensitive information over public networks and ensure communications are encrypted (HTTPS).</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-0392eb4 e-flex e-con-boxed e-con e-child" data-id="0392eb4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0b4eb74 elementor-widget elementor-widget-text-editor" data-id="0b4eb74" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Adopt Zero-Trust Principles</strong></h5><p>Zero trust continuously verifies the identity and trustworthiness of devices and users, potentially denying access even if credentials are stolen.</p>								</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-e25b5a0 elementor-widget elementor-widget-text-editor" data-id="e25b5a0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>While no single article can cover all the ways AI is used in cyberattacks, understanding these tactics and implementing robust security measures can help protect your organization. For more detailed insights on password protection and cybersecurity in the age of AI, check out Emre’s blog on Password Protection.</p>								</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Stay vigilant and informed to safeguard your business against evolving cyber threats.</h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Fortify your cybersecurity defenses. Contact us today. </h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Get in touch</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/5-ways-cybercriminals-are-using-ai/">5 Ways Cybercriminals are using AI</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Baseline Cyber Security Controls for Small and Medium Organizations: A Guide from the Canadian Centre for Cyber Security</title>
		<link>https://partek.ca/baseline-cyber-security-controls-for-small-and-medium-organizations-a-guide-from-the-canadian-centre-for-cyber-security/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 05 Jun 2024 12:00:52 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27913</guid>

					<description><![CDATA[<p>The Canadian Centre for Cyber Security (CCCS) has published a comprehensive set of baseline cybersecurity controls specifically designed for small and medium-sized organizations (SMOs) to help them protect against common cyber threats. </p>
<p>The post <a href="https://partek.ca/baseline-cyber-security-controls-for-small-and-medium-organizations-a-guide-from-the-canadian-centre-for-cyber-security/">Baseline Cyber Security Controls for Small and Medium Organizations: A Guide from the Canadian Centre for Cyber Security</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27913" class="elementor elementor-27913">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-2b8b4e1c elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2b8b4e1c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76343928" data-id="76343928" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d1b210a elementor-widget elementor-widget-heading" data-id="d1b210a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">A Guide from the Canadian Centre for Cyber Security
: </h4>				</div>
				<div class="elementor-element elementor-element-ae7a81c elementor-widget elementor-widget-heading" data-id="ae7a81c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Baseline Cyber Security Controls for Small and Medium Organizations</h3>				</div>
				<div class="elementor-element elementor-element-ca7e76d elementor-widget elementor-widget-text-editor" data-id="ca7e76d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>The <a href="https://www.cyber.gc.ca/en" target="_blank" rel="noopener">Canadian Centre for Cyber Security (CCCS)</a> has published a comprehensive set of baseline cybersecurity controls specifically designed for small and medium-sized organizations (SMOs) to help them protect against common cyber threats.</h5><p>Modern cyber threats are increasingly sophisticated, posing significant risks to small and medium-sized organizations (SMOs). Recognizing this, the <a href="https://www.cyber.gc.ca/en" target="_blank" rel="noopener">Canadian Centre for Cyber Security (CCCS)</a> has developed a comprehensive set of baseline cybersecurity controls tailored specifically for SMOs. These controls aim to enhance the cybersecurity posture of these organizations, helping them protect sensitive data, maintain business continuity, and mitigate potential cyber threats.</p>								</div>
		<div class="elementor-element elementor-element-0b71a80 e-flex e-con-boxed e-con e-parent" data-id="0b71a80" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-d349ec7 elementor-widget elementor-widget-heading" data-id="d349ec7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Why is Cyber Security is Critical for SMOs?</h4>				</div>
				<div class="elementor-element elementor-element-2347a7a elementor-widget elementor-widget-text-editor" data-id="2347a7a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>SMOs are often seen as prime targets for cybercriminals due to perceived vulnerabilities such as limited IT resources and less stringent security measures compared to larger enterprises. Cyber incidents can lead to severe consequences, including financial losses, reputational damage, and operational disruptions. Implementing robust cybersecurity controls is essential to safeguard against these risks.</p>								</div>
				<div class="elementor-element elementor-element-9991df6 elementor-widget elementor-widget-heading" data-id="9991df6" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The CCCS Baseline Cyber Security Controls:</h4>				</div>
				<div class="elementor-element elementor-element-9360bd8 elementor-widget elementor-widget-text-editor" data-id="9360bd8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The CCCS has outlined a set of practical and effective cybersecurity controls that SMOs can implement to defend against common cyber threats. These controls are designed to be cost-effective and scalable, ensuring that organizations of varying sizes and industries can adopt them with minimal complexity.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f1f9634 e-flex e-con-boxed e-con e-parent" data-id="f1f9634" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-04c6fc3 e-flex e-con-boxed e-con e-child" data-id="04c6fc3" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-13a6178 elementor-widget elementor-widget-heading" data-id="13a6178" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Identify and Manage Assets</h5>				</div>
				<div class="elementor-element elementor-element-780f2b3 elementor-widget elementor-widget-text-editor" data-id="780f2b3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Data Classification:</strong> Classify data based on its sensitivity and implement appropriate protection measures for each classification level.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-38d2f6c elementor-widget elementor-widget-text-editor" data-id="38d2f6c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Asset Inventory:</strong> Maintain an up-to-date inventory of all hardware and software assets. This helps in identifying unauthorized devices and software that could pose security risks.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-40d9ccc e-flex e-con-boxed e-con e-parent" data-id="40d9ccc" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-b609a96 e-flex e-con-boxed e-con e-child" data-id="b609a96" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-b191c08 elementor-widget elementor-widget-heading" data-id="b191c08" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Secure Systems and Network Configurations</h5>				</div>
				<div class="elementor-element elementor-element-c823b39 elementor-widget elementor-widget-text-editor" data-id="c823b39" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Baseline Configurations:</strong> Establish and maintain secure baseline configurations for all IT assets, including operating systems, applications, and network devices.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-18c900c elementor-widget elementor-widget-text-editor" data-id="18c900c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Patch Management:</strong> Regularly update systems and applications with the latest security patches to protect against known vulnerabilities.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-92d751b e-flex e-con-boxed e-con e-parent" data-id="92d751b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-df5f308 e-flex e-con-boxed e-con e-child" data-id="df5f308" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-94c6bfb elementor-widget elementor-widget-heading" data-id="94c6bfb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Control Access and Privileges</h5>				</div>
				<div class="elementor-element elementor-element-981e1ba elementor-widget elementor-widget-text-editor" data-id="981e1ba" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>User Access Management:</strong> Implement strong access controls to ensure that only authorized personnel have access to critical systems and data. Use the principle of least privilege to limit access rights.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-e15e3fd elementor-widget elementor-widget-text-editor" data-id="e15e3fd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Multi-Factor Authentication (MFA):</strong> Enforce MFA for accessing sensitive systems to add an extra layer of security.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-fd62244 e-flex e-con-boxed e-con e-parent" data-id="fd62244" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-0c26470 e-flex e-con-boxed e-con e-child" data-id="0c26470" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-593d4b5 elementor-widget elementor-widget-heading" data-id="593d4b5" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Protect Against Malware and Other Threats</h5>				</div>
				<div class="elementor-element elementor-element-819425a elementor-widget elementor-widget-text-editor" data-id="819425a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Antivirus and Anti-Malware Software:</strong> Deploy and regularly update antivirus and anti-malware solutions to detect and prevent malicious software.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-8816b6a elementor-widget elementor-widget-text-editor" data-id="8816b6a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Email Security:</strong> Implement email filtering solutions to block phishing emails and other malicious content.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-83908b1 e-flex e-con-boxed e-con e-parent" data-id="83908b1" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-c2ccf1b e-flex e-con-boxed e-con e-child" data-id="c2ccf1b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0f3c449 elementor-widget elementor-widget-heading" data-id="0f3c449" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Secure Data and Backup</h5>				</div>
				<div class="elementor-element elementor-element-3b033fe elementor-widget elementor-widget-text-editor" data-id="3b033fe" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Data Encryption:</strong> Encrypt sensitive data both at rest and in transit to protect it from unauthorized access.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-7fe5908 elementor-widget elementor-widget-text-editor" data-id="7fe5908" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Regular Backups:</strong> Perform regular backups of critical data and ensure that backup data is stored securely and tested for restoration.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-06fc014 e-flex e-con-boxed e-con e-parent" data-id="06fc014" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-0441e8e e-flex e-con-boxed e-con e-child" data-id="0441e8e" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-c5293d8 elementor-widget elementor-widget-heading" data-id="c5293d8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Monitor and Respond to Incidents</h5>				</div>
				<div class="elementor-element elementor-element-0e17779 elementor-widget elementor-widget-text-editor" data-id="0e17779" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Continuous Monitoring:</strong> Implement continuous monitoring solutions to detect suspicious activities and potential security incidents in real-time.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-5cc1b52 elementor-widget elementor-widget-text-editor" data-id="5cc1b52" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Incident Response Plan:</strong> Develop and maintain an incident response plan to quickly and effectively respond to and recover from cybersecurity incidents.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-2c92695 e-flex e-con-boxed e-con e-parent" data-id="2c92695" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-4e6cd8c e-flex e-con-boxed e-con e-child" data-id="4e6cd8c" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-872e29c elementor-widget elementor-widget-heading" data-id="872e29c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Educate and Train Employees</h5>				</div>
				<div class="elementor-element elementor-element-1a6fafa elementor-widget elementor-widget-text-editor" data-id="1a6fafa" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Security Awareness Training:</strong> Provide regular cybersecurity training to employees to increase awareness of common threats like phishing and social engineering attacks.</li><li style="list-style-type: none;"> </li></ul>								</div>
				<div class="elementor-element elementor-element-ffe6a9f elementor-widget elementor-widget-text-editor" data-id="ffe6a9f" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<ul><li><strong>Policy Enforcement:</strong> Establish and enforce cybersecurity policies that outline acceptable use of IT resources and data protection practices.</li></ul>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-94cdfc7 e-flex e-con-boxed e-con e-parent" data-id="94cdfc7" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-08672d3 e-flex e-con-boxed e-con e-child" data-id="08672d3" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-f1e9c8d elementor-widget elementor-widget-heading" data-id="f1e9c8d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Implementing the Controls: Best Practices for SMOs</h4>				</div>
				<div class="elementor-element elementor-element-81b1728 elementor-widget elementor-widget-text-editor" data-id="81b1728" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>To successfully implement these cybersecurity controls, SMOs should consider the following best practices:</p>								</div>
				<div class="elementor-element elementor-element-e8533eb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="e8533eb" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Assess Current Security Posture: Conduct a thorough assessment of existing security measures and identify gaps that need to be addressed.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Prioritize Controls Based on Risk: Focus on implementing controls that address the highest risks to your organization first.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Leverage External Expertise: Partner with Managed Service Providers (MSPs) that specialize in cybersecurity to gain access to expert knowledge and advanced security tools.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Regularly Review and Update Controls: Cybersecurity is an ongoing process. Regularly review and update your security controls to adapt to evolving threats.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-c691459 elementor-widget elementor-widget-text-editor" data-id="c691459" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>The baseline cybersecurity controls provided by the Canadian Centre for Cyber Security offer a practical framework for small and medium organizations to enhance their cybersecurity defenses. By adopting these controls, SMOs can significantly reduce their risk of cyber incidents, protect their valuable assets, and ensure the continuity of their operations in an increasingly digital world.</h5><p>The Canadian Centre for Cyber Security has published several documents and guidelines that outline these controls. For precise and detailed information, refer to the following CCCS publication: <a href="https://www.cyber.gc.ca/sites/default/files/cyber/publications/Baseline.Controls.SMO1_.2-e%20.pdf" target="_blank" rel="noopener">CCCS Document</a></p>								</div>
					</div>
				</div>
					</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">For more information on how to implement these controls, contact us!</h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Our team is dedicated to helping SMOs achieve robust cybersecurity and peace of mind.</h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Contact us</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/baseline-cyber-security-controls-for-small-and-medium-organizations-a-guide-from-the-canadian-centre-for-cyber-security/">Baseline Cyber Security Controls for Small and Medium Organizations: A Guide from the Canadian Centre for Cyber Security</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does your business have a disaster recovery plan in place?</title>
		<link>https://partek.ca/do-you-have-a-disaster-recovery-plan-in-place/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 28 May 2024 12:00:11 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27901</guid>

					<description><![CDATA[<p>Think of it as your emergency playbook – a set of protocols and procedures designed to keep things running smoothly even when disaster strikes. </p>
<p>The post <a href="https://partek.ca/do-you-have-a-disaster-recovery-plan-in-place/">Does your business have a disaster recovery plan in place?</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27901" class="elementor elementor-27901">
				<div class="elementor-element elementor-element-fb1357b e-flex e-con-boxed e-con e-parent" data-id="fb1357b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-ad163e3 e-con-full e-flex e-con e-child" data-id="ad163e3" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fb55e75 elementor-widget elementor-widget-heading" data-id="fb55e75" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Does your business have a disaster recovery plan in place?</h3>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f6ce3cd e-flex e-con-boxed e-con e-parent" data-id="f6ce3cd" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-86ce49f e-con-full e-flex e-con e-child" data-id="86ce49f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8485557 elementor-widget elementor-widget-image" data-id="8485557" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="800" height="600" src="https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589-1024x768.jpeg" class="attachment-large size-large wp-image-27905" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589-1024x768.jpeg 1024w, https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589-300x225.jpeg 300w, https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589-768x576.jpeg 768w, https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589-1536x1152.jpeg 1536w, https://partek.ca/wp-content/uploads/2024/05/AdobeStock_169928589.jpeg 1920w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				</div>
		<div class="elementor-element elementor-element-c8f3ed2 e-con-full e-flex e-con e-child" data-id="c8f3ed2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8eb1c03 elementor-widget elementor-widget-heading" data-id="8eb1c03" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Picture your business as a bustling kitchen in a busy restaurant. You're the head chef, orchestrating the flow of orders and ensuring that everything runs smoothly. But just like in any kitchen, unexpected mishaps can occur – a stove might malfunction, a pot might boil over, or a crucial ingredient might run out.</h5>				</div>
				<div class="elementor-element elementor-element-9aa313b elementor-widget elementor-widget-heading" data-id="9aa313b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">Now, imagine if you didn't have a backup plan for when these mishaps happen. It would be like cooking without a fire extinguisher or spare ingredients in the pantry. You'd be left scrambling to improvise, risking delays, unhappy customers, and even damage to your reputation.</h5>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-8a7ff01 e-flex e-con-boxed e-con e-parent" data-id="8a7ff01" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-534003d e-con-full e-flex e-con e-child" data-id="534003d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-782531c elementor-widget elementor-widget-text-editor" data-id="782531c" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>That&#8217;s where a Disaster Recovery Plan (DRP) comes in. Think of it as your kitchen&#8217;s emergency playbook – a set of protocols and procedures designed to keep things running smoothly even when disaster strikes. Just as you have backups for ingredients and equipment, your DRP ensures you have backups for your data, systems, and operations.</h4><p>Without a DRP, your business is like a chef cooking without a safety net – vulnerable to the chaos of unexpected events. But with a well-prepared DRP in place, you&#8217;re like a chef with a fully stocked pantry and a clear plan for any contingency. You can handle whatever comes your way with confidence, knowing that your business is resilient and prepared for whatever the future holds.</p>								</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-007ec4a e-flex e-con-boxed e-con e-parent" data-id="007ec4a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5e9d726 e-con-full e-flex e-con e-child" data-id="5e9d726" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-014a1fc elementor-widget elementor-widget-heading" data-id="014a1fc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Let's explore why having a DRP in place is essential for safeguarding your business against cyber threats:</h4>				</div>
				<div class="elementor-element elementor-element-f6384d5 elementor-widget elementor-widget-text-editor" data-id="f6384d5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>As cyber criminals become more sophisticated in their tactics, organizations must be prepared to defend against these threats and mitigate their impact. One critical component of any comprehensive cyber-security strategy is a robust Disaster Recovery Plan (DRP).</h5>								</div>
				<div class="elementor-element elementor-element-2b6527a elementor-widget elementor-widget-heading" data-id="2b6527a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Taking Proactive Measures with Managed Detection and Response (MDR)</h4>				</div>
				<div class="elementor-element elementor-element-343cef0 elementor-widget elementor-widget-text-editor" data-id="343cef0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Managed Detection and Response (MDR) empowers organizations to take proactive and targeted actions against even the most sophisticated threats. By proactively hunting for and validating potential threats, initiating remote actions to disrupt and neutralize threats, and providing actionable advice for addressing root causes, MDR helps organizations stay ahead of cyber threats and minimize their impact.</p>								</div>
				<div class="elementor-element elementor-element-ef4a590 elementor-widget elementor-widget-heading" data-id="ef4a590" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Growing Impact of Cyber Attacks</h4>				</div>
				<div class="elementor-element elementor-element-5538697 elementor-widget elementor-widget-text-editor" data-id="5538697" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The impact of cyber attacks is becoming increasingly severe, with ransomware attacks leading the charge. According to recent reports, there has been a staggering increase in ransomware attacks globally, with the average ransom payment reaching new heights. Small and medium-sized enterprises (SMEs) are increasingly being targeted due to their perceived weaker security measures, and the consequences can be devastating. Many SMEs that suffer a ransomware attack are forced to close their doors within months, highlighting the urgent need for robust cyber-security measures, including a comprehensive DRP.</p>								</div>
				<div class="elementor-element elementor-element-965e02f elementor-widget elementor-widget-heading" data-id="965e02f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Importance of Disaster Recovery Planning</h4>				</div>
				<div class="elementor-element elementor-element-cddb9b6 elementor-widget elementor-widget-text-editor" data-id="cddb9b6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>A Disaster Recovery Plan is a proactive strategy designed to ensure business continuity and minimize downtime in the event of a cyber attack or other disaster. It outlines the steps to be taken to recover critical systems and data, restore operations, and resume normal business activities as quickly as possible. A well-thought-out DRP considers various scenarios and outlines clear procedures for response and recovery, empowering organizations to navigate crises with confidence.</p><p>Rebuilding a tarnished reputation takes time. It also takes concerted efforts. These may involve public relations campaigns and enhanced security measures. These actions help assure stakeholders of renewed commitment to data protection.</p>								</div>
				<div class="elementor-element elementor-element-cc877bb elementor-widget elementor-widget-heading" data-id="cc877bb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Mitigating Risks and Ensuring Business Continuity</h4>				</div>
				<div class="elementor-element elementor-element-a6d6ccd elementor-widget elementor-widget-text-editor" data-id="a6d6ccd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Cyber attacks are not a matter of if, but when. </h5><p>Therefore, it&#8217;s crucial for businesses to have a multi-layered defense strategy in place, with a Disaster Recovery Plan at its core. While training and awareness programs are essential for educating staff about cyber threats, they are not sufficient on their own. A comprehensive DRP, combined with Managed Security Solutions and Total Data Protection, provides the ultimate failsafe in safeguarding against cyber threats. By investing in a DRP, organizations can mitigate risks, ensure business continuity, and protect their most valuable assets – their data and reputation.</p>								</div>
				<div class="elementor-element elementor-element-bfdaec0 elementor-widget elementor-widget-heading" data-id="bfdaec0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Having a Disaster Recovery Plan is not optional – it's essential. </h4>				</div>
				<div class="elementor-element elementor-element-6d2fdab elementor-widget elementor-widget-text-editor" data-id="6d2fdab" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>With the rise of ransomware attacks and other cyber threats, organizations must be prepared to defend against and recover from potential disasters. A comprehensive DRP, coupled with proactive measures such as Managed Detection and Response, multi-layered defense strategies, and employee training, empowers organizations to mitigate risks and ensure the continuity of their business operations. </p>								</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Don't wait until it's too late – invest in a Disaster Recovery Plan and safeguard your business against cyber threats.</h3>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/managed-detection-and-response/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Our Managed Detection and Response Solutions</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/do-you-have-a-disaster-recovery-plan-in-place/">Does your business have a disaster recovery plan in place?</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Partek Achieves Gold Partner Status with Xerox</title>
		<link>https://partek.ca/partek-achieves-gold-partner-status-with-xerox/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 24 May 2024 16:16:51 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=28022</guid>

					<description><![CDATA[<p>We’re excited to share this greats news –  as a Xerox Gold Partner we now offer additional print solutions and supplies to improve the way your workplace works. </p>
<p>The post <a href="https://partek.ca/partek-achieves-gold-partner-status-with-xerox/">Partek Achieves Gold Partner Status with Xerox</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="28022" class="elementor elementor-28022">
				<div class="elementor-element elementor-element-4371fc4 e-flex e-con-boxed e-con e-parent" data-id="4371fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6cfc3e8 e-con-full e-flex e-con e-child" data-id="6cfc3e8" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-f2419d5 e-flex e-con-boxed e-con e-child" data-id="f2419d5" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-0aaf413 e-con-full e-flex e-con e-child" data-id="0aaf413" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-bf0000d elementor-widget elementor-widget-image" data-id="bf0000d" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="720" height="527" src="https://partek.ca/wp-content/uploads/2024/05/xerox-lrg.jpg" class="attachment-large size-large wp-image-28024" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/xerox-lrg.jpg 720w, https://partek.ca/wp-content/uploads/2024/05/xerox-lrg-300x220.jpg 300w" sizes="(max-width: 720px) 100vw, 720px" />															</div>
				</div>
		<div class="elementor-element elementor-element-9f7bc26 e-flex e-con-boxed e-con e-child" data-id="9f7bc26" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-89a5131 elementor-widget elementor-widget-heading" data-id="89a5131" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Partek Achieves Gold Partner Status with Xerox</h3>				</div>
				<div class="elementor-element elementor-element-f482362 elementor-widget elementor-widget-text-editor" data-id="f482362" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4><strong>We’re excited to share this greats news –  as a Xerox Gold Partner we now offer additional print solutions and supplies to improve the way your workplace works. </strong></h4>								</div>
					</div>
				</div>
					</div>
				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-419ab1a e-flex e-con-boxed e-con e-parent" data-id="419ab1a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-331015d e-con-full e-flex e-con e-child" data-id="331015d" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-956b662 e-con-full e-flex e-con e-child" data-id="956b662" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fc79427 elementor-widget elementor-widget-text-editor" data-id="fc79427" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>As we continue to build on our partnership with Xerox we look forward to helping our clients with award-winning technology and innovations designed to make work better, simpler, less stressful, and more productive for everyone.</p><h4><strong>How does this benefit you?</strong></h4><p>With a vast range of offerings, you can benefit from increased value and productivity from one of the original, great technology innovators.</p><p> </p>								</div>
				</div>
				<div class="elementor-element elementor-element-eabf875 elementor-widget elementor-widget-heading" data-id="eabf875" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">What’s on offer?</h4>				</div>
		<div class="elementor-element elementor-element-add0fbd e-flex e-con-boxed e-con e-child" data-id="add0fbd" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-b66233d e-flex e-con-boxed e-con e-child" data-id="b66233d" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-4c510da elementor-widget elementor-widget-text-editor" data-id="4c510da" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Xerox Printers</strong></h5><p>From desktop printers for individuals, to workgroup printers that support entire teams. All being reliable, easy to use, simple to connect to and built with security and sustainability in mind.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-ace5fc4 e-flex e-con-boxed e-con e-child" data-id="ace5fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-7b360e8 elementor-widget elementor-widget-text-editor" data-id="7b360e8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Genuine Xerox<sup>®</sup> Toner</strong></h5><p>When you’ve invested in Xerox printing technology you don’t want any worries of breakdowns or issues caused by non-compatible toner. Be assured of quality and dependability, page after page with Genuine Xerox Toner. Xerox superior toners are engineered to be environmentally responsible, safe and help you to reach your sustainability goals.</p>								</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-4a5f4f9 e-flex e-con-boxed e-con e-child" data-id="4a5f4f9" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-9f09cee elementor-widget elementor-widget-text-editor" data-id="9f09cee" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5><strong>Managed Print Services</strong></h5><p>Take away the worry of printing so you can focus on your real business with Xerox Managed Print Services. Solutions include powerful tools for remote monitoring, ensuring optimal machine performance and toner and supplies use. Keeps your team working securely and efficiently without the worry.</p>								</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-75f3d17 e-flex e-con-boxed e-con e-child" data-id="75f3d17" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5486e14 e-con-full e-flex e-con e-child" data-id="5486e14" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-aa691b1 elementor-widget elementor-widget-heading" data-id="aa691b1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">A little about Xerox and their big history…</h4>				</div>
				<div class="elementor-element elementor-element-ac950ac elementor-widget elementor-widget-text-editor" data-id="ac950ac" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>For more than 100 years, Xerox has continually redefined the workplace experience developing many of the technologies we take for granted in the office. Building on this, Xerox continues to innovate technology, software, and services to power today’s workforce. Aiming to make every day work better for you — no matter where that work is being done.  All with focus on value, productivity, security, and sustainability top of mind.</p>								</div>
				</div>
					</div>
				</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Looking for effortless print management?</h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Partek's managed print services include everything from hardware procurement and installation to maintenance and support. We'll handle all of the technical details, so you can focus on running your business.</h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/managed-print-solutions/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Learn more</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/partek-achieves-gold-partner-status-with-xerox/">Partek Achieves Gold Partner Status with Xerox</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Breach at London Drugs: A Wake-Up Call for Businesses</title>
		<link>https://partek.ca/cybersecurity-breach-at-london-drugs-a-wake-up-call-for-businesses/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 22 May 2024 17:11:54 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27923</guid>

					<description><![CDATA[<p>On April 28, 2024, London Drugs, a well-known retailer and pharmacy chain, faced a severe cybersecurity breach that forced the temporary closure of all its 79 stores across Western Canada. </p>
<p>The post <a href="https://partek.ca/cybersecurity-breach-at-london-drugs-a-wake-up-call-for-businesses/">Cybersecurity Breach at London Drugs: A Wake-Up Call for Businesses</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27923" class="elementor elementor-27923">
				<div class="elementor-element elementor-element-fb1357b e-flex e-con-boxed e-con e-parent" data-id="fb1357b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-ad163e3 e-con-full e-flex e-con e-child" data-id="ad163e3" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-7b120c8 elementor-widget elementor-widget-heading" data-id="7b120c8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">A Wake-Up Call for Businesses:</h4>				</div>
				<div class="elementor-element elementor-element-fb55e75 elementor-widget elementor-widget-heading" data-id="fb55e75" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Cybersecurity Breach at London Drugs</h3>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-f6ce3cd e-flex e-con-boxed e-con e-parent" data-id="f6ce3cd" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-86ce49f e-con-full e-flex e-con e-child" data-id="86ce49f" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-8485557 elementor-widget elementor-widget-image" data-id="8485557" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="800" height="518" src="https://partek.ca/wp-content/uploads/2024/05/londondrugs.jpeg" class="attachment-large size-large wp-image-27924" alt="" srcset="https://partek.ca/wp-content/uploads/2024/05/londondrugs.jpeg 1000w, https://partek.ca/wp-content/uploads/2024/05/londondrugs-300x194.jpeg 300w, https://partek.ca/wp-content/uploads/2024/05/londondrugs-768x498.jpeg 768w" sizes="(max-width: 800px) 100vw, 800px" />															</div>
				</div>
		<div class="elementor-element elementor-element-c8f3ed2 e-con-full e-flex e-con e-child" data-id="c8f3ed2" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9aa313b elementor-widget elementor-widget-heading" data-id="9aa313b" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">On April 28, 2024, London Drugs, a well-known retailer and pharmacy chain, faced a severe cybersecurity breach that forced the temporary closure of all its 79 stores across Western Canada. <br><br>The stores remained shut for over a week, fully reopening only on May 7th, 2024. The attack was orchestrated by a sophisticated group of global cybercriminals, identified as the ransomware syndicate LockBit, who demanded a $25 million ransom to prevent the release of stolen data.</h5>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-007ec4a e-flex e-con-boxed e-con e-parent" data-id="007ec4a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5e9d726 e-con-full e-flex e-con e-child" data-id="5e9d726" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-014a1fc elementor-widget elementor-widget-heading" data-id="014a1fc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Impact of the Cyber Attack:</h4>				</div>
				<div class="elementor-element elementor-element-f6384d5 elementor-widget elementor-widget-text-editor" data-id="f6384d5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>London Drugs confirmed that the cybercriminals had exfiltrated electronic files from its corporate head office. While the company assured that no customer, patient, or &#8220;primary employee&#8221; databases were compromised, the full extent of the breach is still under investigation. The retailer has taken significant steps to mitigate the impacts, including notifying all current employees of the potential effects and providing 24 months of free credit monitoring and identity theft protection services.</h5><div>Despite the dire situation, London Drugs has firmly stated that it is &#8220;unwilling and unable&#8221; to pay the ransom demanded by the cybercriminals. This stance is a critical decision point for organizations facing similar threats, balancing the immediate risk of data exposure against the long-term consequences of funding criminal activities. The company has pledged to notify affected individuals in accordance with privacy laws should the situation change as the investigation continues.</div>								</div>
				<div class="elementor-element elementor-element-c283fd1 elementor-widget elementor-widget-heading" data-id="c283fd1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Lessons for Small and Medium Businesses</h4>				</div>
				<div class="elementor-element elementor-element-343cef0 elementor-widget elementor-widget-text-editor" data-id="343cef0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The cyberattack on London Drugs underscores the importance of robust cybersecurity measures for businesses of all sizes. Here are some key takeaways for small and medium-sized organizations (SMOs):</p>								</div>
				<div class="elementor-element elementor-element-b58a8f0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="b58a8f0" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Comprehensive Cybersecurity Strategy Having a well-rounded cybersecurity strategy is essential. This includes regular updates and patches for software, strong access controls, and continuous monitoring for suspicious activities.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Employee Training and Awareness Educating employees about cybersecurity threats and best practices can prevent many attacks. Phishing and social engineering are common tactics used by cybercriminals to gain access to systems.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Data Backup and Recovery Regularly backing up data and ensuring that backups are secure and recoverable can mitigate the impact of ransomware attacks. This allows organizations to restore data without paying the ransom.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Incident Response Plan An effective incident response plan ensures that an organization can quickly respond to and recover from a cybersecurity incident. This plan should include clear communication strategies and predefined roles and responsibilities.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Cybersecurity Insurance Considering cybersecurity insurance can provide a financial safety net in the event of a cyber incident. This insurance can cover various costs associated with a breach, including investigation, notification, and remediation.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-5538697 elementor-widget elementor-widget-text-editor" data-id="5538697" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<div class="flex flex-grow flex-col max-w-full"><div class="min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-2" dir="auto" data-message-author-role="assistant" data-message-id="f8a83f9a-2203-44a0-b5a6-2d14ea18ecb7"><div class="flex w-full flex-col gap-1 juice:empty:hidden juice:first:pt-[3px]"><div class="markdown prose w-full break-words dark:prose-invert dark"><p>The London Drugs cyberattack serves as a stark reminder of the evolving threat landscape and the critical need for businesses to strengthen their cybersecurity defenses. By implementing robust cybersecurity controls and maintaining vigilance, small and medium organizations can better protect themselves against such threats.</p></div></div></div></div>								</div>
				<div class="elementor-element elementor-element-8df3112 elementor-widget elementor-widget-heading" data-id="8df3112" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://chatnewstoday.ca/2024/05/21/london-drugs-says-its-unwilling-to-pay-ransom-demanded-by-hackers/" target="_blank">Source: Chat News</a></h6>				</div>
				<div class="elementor-element elementor-element-2a9b65a elementor-widget elementor-widget-heading" data-id="2a9b65a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h6 class="elementor-heading-title elementor-size-default"><a href="https://www.timescolonist.com/local-news/ransomware-group-says-it-will-release-stolen-london-drugs-data-if-it-doesnt-get-25m-in-48-hours-8776889" target="_blank">Source: Time Colonist</a></h6>				</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Enhance your organization's cybersecurity posture.</h3>				</div>
				<div class="elementor-element elementor-element-290e565 elementor-widget elementor-widget-heading" data-id="290e565" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The team at Partek is dedicated to helping businesses implement effective cybersecurity measures to safeguard their operations and data.</h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Contact us!</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/cybersecurity-breach-at-london-drugs-a-wake-up-call-for-businesses/">Cybersecurity Breach at London Drugs: A Wake-Up Call for Businesses</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How much a Data Breach can cost your business</title>
		<link>https://partek.ca/how-a-data-breach-can-cost-your-business-for-years/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 01 May 2024 12:00:27 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27694</guid>

					<description><![CDATA[<p>Learn from examples of businesses grappling with the long-term repercussions of data breaches. From financial losses to damaged reputations, our latest article explores the lasting impact. </p>
<p>The post <a href="https://partek.ca/how-a-data-breach-can-cost-your-business-for-years/">How much a Data Breach can cost your business</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27694" class="elementor elementor-27694">
				<div class="elementor-element elementor-element-fb1357b e-flex e-con-boxed e-con e-parent" data-id="fb1357b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-ad163e3 e-con-full e-flex e-con e-child" data-id="ad163e3" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-fb55e75 elementor-widget elementor-widget-heading" data-id="fb55e75" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">How a data breach can cost your business for years </h3>				</div>
				<div class="elementor-element elementor-element-20df1ce elementor-widget elementor-widget-heading" data-id="20df1ce" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">These days, data is the lifeblood of businesses. It fuels operations, decision-making, and customer interactions. But there is a dark underbelly of this data-centric landscape. It's the persistent threat of data breaches. </h4>				</div>
				<div class="elementor-element elementor-element-c685203 elementor-widget elementor-widget-text-editor" data-id="c685203" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The repercussions of a data breach extend far beyond the immediate aftermath. They often haunt businesses for years. Only <a href="https://www.ibm.com/reports/data-breach">51% of data breach costs</a> occur within the first year of an incident. The other 49% happen in year two and beyond. </p>								</div>
				<div class="elementor-element elementor-element-a7ec733 elementor-widget elementor-widget-text-editor" data-id="a7ec733" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Let&#8217;s take a look at the long-term consequences of a data breach. As well as examine a real-world example. You’ll see how a single breach can have enduring implications. Ones that impact a business&#8217;s reputation, finances, and regulatory standing.</h4>								</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-007ec4a e-flex e-con-boxed e-con e-parent" data-id="007ec4a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-5e9d726 e-con-full e-flex e-con e-child" data-id="5e9d726" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-014a1fc elementor-widget elementor-widget-heading" data-id="014a1fc" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Unseen Costs of a Data Breach</h4>				</div>
				<div class="elementor-element elementor-element-f6384d5 elementor-widget elementor-widget-text-editor" data-id="f6384d5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Introduction to the First American Title Insurance Co. Case:</h4>								</div>
				<div class="elementor-element elementor-element-c1b9706 elementor-widget elementor-widget-text-editor" data-id="c1b9706" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The <a href="https://www.cybersecuritydive.com/news/new-york-1m-settlement-first-american/700849/">2019 cybersecurity breach at First American</a> serves as a stark illustration. It reminds us of the far-reaching consequences of a data breach. In this case, the New York Department of Financial Services (NYDFS) imposed a $1 million fine. Cybersecurity sites announced the fine in the fall of 2023. The company’s fine was for failing to safeguard sensitive consumer information.</p><p>The breach exposed over 880 million documents. These files contained personal and financial data. The breach represented a significant violation of data protection standards. This is one example of how costs can come long after an initial breach. </p><h5><span style="text-align: var(--text-align); letter-spacing: 0.2px;">Here are some other ways security incidents can haunt businesses for years:</span></h5>								</div>
				<div class="elementor-element elementor-element-2b6527a elementor-widget elementor-widget-heading" data-id="2b6527a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Lingering Impacts of a Data Breach</h4>				</div>
				<div class="elementor-element elementor-element-c9e57ac elementor-widget elementor-widget-text-editor" data-id="c9e57ac" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Financial Repercussions:</h4>								</div>
		<div class="elementor-element elementor-element-bbf1dff e-flex e-con-boxed e-con e-child" data-id="bbf1dff" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-85e86bb elementor-widget__width-initial elementor-widget elementor-widget-image" data-id="85e86bb" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="473" height="623" src="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.37.27-PM.png" class="attachment-full size-full wp-image-27718" alt="" srcset="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.37.27-PM.png 473w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.37.27-PM-300x395.png 300w" sizes="(max-width: 473px) 100vw, 473px" />															</div>
		<div class="elementor-element elementor-element-9349fd7 e-flex e-con-boxed e-con e-child" data-id="9349fd7" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-343cef0 elementor-widget elementor-widget-text-editor" data-id="343cef0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p> </p><p>The financial toll of a data breach is significant. Immediate costs include things like:</p><ul><li>Breach detection</li><li>Containment</li><li>Customer notification</li></ul><p><span style="text-align: var(--text-align); letter-spacing: 0.2px;"> </span></p><p><span style="text-align: var(--text-align); letter-spacing: 0.2px;">Beyond those, businesses face long-term expenses. These relate to legal battles, regulatory fines, and reparations. Regulatory penalties are just one facet of the financial repercussions. Others include potential legal actions from affected individuals. As well as class-action lawsuits adding to the monetary strain.</span></p>								</div>
				<div class="elementor-element elementor-element-5ad3101 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5ad3101" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">A shorter data breach lifecycle of fewer than 200 days was associated with an average cost of USD 3.93 million, while a longer lifecycle of more than 200 days was associated with an average cost of USD 4.95 million. This reflects a 23% difference and a cost savings of USD 1.02 million for the shorter lifecycle.</span>
											</a>
									</li>
						</ul>
						</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-7e2d3f4 elementor-widget elementor-widget-heading" data-id="7e2d3f4" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<p class="elementor-heading-title elementor-size-default"><a href="https://www.ibm.com/reports/data-breach" target="_blank">source: IBM’s Cost of a Data Breach Report 2023</a></p>				</div>
				<div class="elementor-element elementor-element-b18c4cd elementor-widget elementor-widget-text-editor" data-id="b18c4cd" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Reputation Damage:</h4>								</div>
				<div class="elementor-element elementor-element-cddb9b6 elementor-widget elementor-widget-text-editor" data-id="cddb9b6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The impact on a business&#8217;s reputation is arguably the most enduring consequence. Customers lose trust in a company&#8217;s ability to protect their sensitive information. This loss of trust can result in a decline in customer retention. As well as acquisition difficulties and long-lasting damage to the brand image.</p><p>Rebuilding a tarnished reputation takes time. It also takes concerted efforts. These may involve public relations campaigns and enhanced security measures. These actions help assure stakeholders of renewed commitment to data protection.</p>								</div>
				<div class="elementor-element elementor-element-3b23de8 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="3b23de8" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Lost business costs include activities such as business disruptions and revenue losses from system downtime, the cost of lost customers and acquiring new customers, and reputation losses and diminished goodwill.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-dca9eb6 elementor-widget elementor-widget-text-editor" data-id="dca9eb6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Regulatory Scrutiny:</h4>								</div>
				<div class="elementor-element elementor-element-98aa4cb elementor-widget elementor-widget-text-editor" data-id="98aa4cb" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p><img loading="lazy" decoding="async" class="alignleft wp-image-27716 size-full" src="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.27.21-PM.png" alt="" width="551" height="216" srcset="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.27.21-PM.png 551w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.27.21-PM-300x118.png 300w" sizes="(max-width: 551px) 100vw, 551px" /></p><p> </p><p>Regulatory bodies increasingly hold businesses accountable for safeguarding consumer data. A data breach triggers regulatory scrutiny. This may lead to fines and ongoing compliance requirements.</p><p>Regulatory authorities take a stringent stance on data security. As well as on companies that fail to meet cybersecurity standards. The fallout includes financial penalties. As well as increased oversight and mandatory security improvements.</p>								</div>
				<div class="elementor-element elementor-element-b17028d elementor-widget elementor-widget-heading" data-id="b17028d" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<p class="elementor-heading-title elementor-size-default"><a href="https://www.ibm.com/reports/data-breach" target="_blank">source: IBM’s Cost of a Data Breach Report 2023</a></p>				</div>
				<div class="elementor-element elementor-element-e98192e elementor-widget elementor-widget-text-editor" data-id="e98192e" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Operational Disruption:</h4>								</div>
				<div class="elementor-element elementor-element-c400376 elementor-widget elementor-widget-text-editor" data-id="c400376" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The aftermath of a data breach disrupts normal business operations. Companies must take remediation efforts and put in place enhanced security measures. These can divert resources away from core business functions.</p><p>The company feels the impact across departments, affecting productivity and efficiency. The ripple effect of operational disruption can extend for years. This impedes growth and hinders the organization&#8217;s ability to adapt to market changes.</p>								</div>
				<div class="elementor-element elementor-element-79f11d8 elementor-widget elementor-widget-text-editor" data-id="79f11d8" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Customer Churn and Acquisition Challenges:</h4>								</div>
				<div class="elementor-element elementor-element-83fb881 elementor-widget elementor-widget-text-editor" data-id="83fb881" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>A data breach often leads to customer churn. Individuals lose confidence in the business&#8217;s ability to protect their data. Acquiring new customers becomes challenging. Potential clients are wary of associating with a brand that has suffered a breach. The prolonged effects on customer acquisition can hinder the company&#8217;s growth. As well as its market competitiveness.</p>								</div>
				<div class="elementor-element elementor-element-c3af2dd elementor-widget elementor-widget-heading" data-id="c3af2dd" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">A Cautionary Tale for Businesses Everywhere</h4>				</div>
				<div class="elementor-element elementor-element-5bceb0d elementor-widget elementor-widget-text-editor" data-id="5bceb0d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>The repercussions of a data breach extend far beyond the immediate incident. They can impact the financial health and reputation of a business for years. As well as its regulatory standing.</h5><p>The frequency and sophistication of cyber threats continue to rise. Proactive cybersecurity measures are not just a necessity. They are a strategic imperative for safeguarding the long-term success of businesses.</p><p>The true cost of a data breach is not always immediately evident. It&#8217;s a complex interplay of things like:</p><ul><li>Financial penalties</li><li>Reputation damage</li><li>Regulatory consequences</li><li>Operational disruption</li></ul><p> </p><p>These impacts can persist for years. It’s important to learn from real-world examples. As well as focusing on robust cybersecurity measures. This helps businesses mitigate the risks associated with data breaches. As well as safeguarding their immediate interests and their long-term viability.</p>								</div>
				<div class="elementor-element elementor-element-6c57792 elementor-widget elementor-widget-image" data-id="6c57792" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
															<img loading="lazy" decoding="async" width="1021" height="519" src="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.48.16-PM.png" class="attachment-full size-full wp-image-27725" alt="" srcset="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.48.16-PM.png 1021w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.48.16-PM-300x152.png 300w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-09-at-2.48.16-PM-768x390.png 768w" sizes="(max-width: 1021px) 100vw, 1021px" />															</div>
				<div class="elementor-element elementor-element-6cdd6ee elementor-widget elementor-widget-heading" data-id="6cdd6ee" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<p class="elementor-heading-title elementor-size-default"><a href="https://www.ibm.com/reports/data-breach" target="_blank">source: IBM’s Cost of a Data Breach Report 2023</a></p>				</div>
				<div class="elementor-element elementor-element-1f43fdb elementor-widget elementor-widget-heading" data-id="1f43fdb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">How does partnering with an MSP impact breach detection and containment time?</h4>				</div>
				<div class="elementor-element elementor-element-7769481 elementor-widget elementor-widget-text-editor" data-id="7769481" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>Organizations with MSSPs experienced a 21% shorter breach lifecycle.</h4><p>In <a href="https://www.ibm.com/reports/data-breach" target="_blank" rel="noopener">IBM&#8217;s 2023 &#8220;Cost of a Data Breach&#8221; report</a>, organizations that had an Managed IT Service Provider (MSP) were able to <b>identify and contain breaches in 80% of the time of those without. </b>Organizations that worked with an MSP <b>identified breaches 16 days faster</b> or an 8.2% shorter identification time than the 2023 reported global average of 204 days. Those that didn’t took 28 days longer or 12.8% longer. Containment times with no MSP were five days longer or 6.6% longer than the 2023 reported global average of 73 days. <b>Containment times with MSP assistance were 10 days faster or 14.7% faster.</b></p><p>MSPs offer security monitoring and management, often using high-availability security operations centers to provide around-the-clock services. MSPs can help organizations enhance their security posture without increasing head-count or investing in training for internal resources.</p>								</div>
				<div class="elementor-element elementor-element-bfdaec0 elementor-widget elementor-widget-heading" data-id="bfdaec0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Recommendations to help
reduce the cost of a data breach</h4>				</div>
				<div class="elementor-element elementor-element-6d2fdab elementor-widget elementor-widget-text-editor" data-id="6d2fdab" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>How can you reduce the financial and reputational impacts of a data breach? Here are some successful security approaches associated with reduced costs and lower times to identify and contain breaches.</p>								</div>
				<div class="elementor-element elementor-element-b53a52e elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="b53a52e" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Understand your exposure to the attacks most relevant to your industry and organization, and prioritize your security strategy accordingly.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Organizations of all types should look to ensure that security is at the forefront of the software they’re developing as well as commercial off-the-shelf software that they’re deploying.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Application testing or penetration testing from the perspective of an attacker can also give organizations the opportunity to identify and patch vulnerabilities before they turn into breaches.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Data is being created, shared and accessed at unprecedented scale across multicloud environments. gaining visibility and control of data spread across hybrid cloud should be a top priority for organizations of all types and should include a focus on strong encryption, data security and data access policies.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Organizations should look to implement network segmentation practices to limit the spread of attacks and the extent of damage they can cause, strengthening overall resiliency and reducing recovery efforts.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Having an MSP that’s well versed in proper protocols and tools to respond to an incident has been shown to significantly reduce costs and the time to identify and contain a breach.</span>
											</a>
									</li>
						</ul>
						</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Need a Cybersecurity Assessment to Prevent an Unexpected Breach?</h3>				</div>
				<div class="elementor-element elementor-element-e3bfb76 elementor-widget elementor-widget-heading" data-id="e3bfb76" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">There are many ways that hackers can breach a network. From endpoints to cloud tools, you must run a tight security ship. Need some help?</h4>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Take our cybersecurity assessment today. This is the first positive step into understanding and addressing your risk, as well as avoiding the consequences of a data breach.</h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/cyber-security-assessment/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Take the Cyber Security Assessment Quiz</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/how-a-data-breach-can-cost-your-business-for-years/">How much a Data Breach can cost your business</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top scams affecting bank clients in Canada</title>
		<link>https://partek.ca/top-scams-affecting-bank-clients-in-canada/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 22 Apr 2024 12:00:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27806</guid>

					<description><![CDATA[<p>Your vigilance is your best defense against financial fraud. By staying informed and following these proactive measures, you can significantly reduce the risk of falling victim to scams. </p>
<p>The post <a href="https://partek.ca/top-scams-affecting-bank-clients-in-canada/">Top scams affecting bank clients in Canada</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27806" class="elementor elementor-27806">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-2b8b4e1c elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="2b8b4e1c" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-76343928" data-id="76343928" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-d1b210a elementor-widget elementor-widget-heading" data-id="d1b210a" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Protecting Your Finances: </h4>				</div>
				<div class="elementor-element elementor-element-ae7a81c elementor-widget elementor-widget-heading" data-id="ae7a81c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Top scams affecting bank clients in Canada</h3>				</div>
				<div class="elementor-element elementor-element-ca7e76d elementor-widget elementor-widget-text-editor" data-id="ca7e76d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>In an age where technology evolves rapidly, so do the tactics employed by criminals aiming to exploit unsuspecting banking clients.</h5><p>At Partek, we understand the paramount importance of safeguarding your personal information. Let&#8217;s shed some light on some of the most prevalent scams affecting bank clients in Canada. By staying informed and vigilant, you can fortify yourself against these threats.</p>								</div>
					</div>
		</div>
					</div>
		</section>
		<div class="elementor-element elementor-element-aff609f e-flex e-con-boxed e-con e-parent" data-id="aff609f" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-9a98e7b e-con-full e-flex e-con e-child" data-id="9a98e7b" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-183474d e-flex e-con-boxed e-con e-child" data-id="183474d" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6b60240 e-con-full e-flex e-con e-child" data-id="6b60240" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-b6c2ab0 elementor-widget elementor-widget-heading" data-id="b6c2ab0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Impersonation Scams:</h4>				</div>
				<div class="elementor-element elementor-element-3ec1c62 elementor-widget elementor-widget-text-editor" data-id="3ec1c62" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Impersonation scams involve fraudsters masquerading as legitimate financial institutions to obtain sensitive information like usernames, passwords, and one-time security codes. These scammers often use deceptive emails, text messages, or phone calls, sometimes even employing caller IDs that mimic your bank&#8217;s name.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-9a7ef27 e-flex e-con-boxed e-con e-child" data-id="9a7ef27" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-f4dea04 elementor-widget elementor-widget-text-editor" data-id="f4dea04" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Red flags to watch for:</h5>								</div>
				<div class="elementor-element elementor-element-5766d9b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="5766d9b" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Urgent requests for personal information.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Subtle typos in email addresses and URLs.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Suspicious links or attachments.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-f5b06fa elementor-widget elementor-widget-text-editor" data-id="f5b06fa" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Protect yourself by:</h5>								</div>
				<div class="elementor-element elementor-element-0f817e8 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="0f817e8" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Verifying the legitimacy of any communication by contacting your bank directly.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Never divulging your one-time security code—remember, your bank will never ask for it!</span>
									</li>
						</ul>
						</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-422a85e e-flex e-con-boxed e-con e-child" data-id="422a85e" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-aa178af e-con-full e-flex e-con e-child" data-id="aa178af" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-9ebb6ed elementor-widget elementor-widget-heading" data-id="9ebb6ed" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Identity Theft:</h4>				</div>
				<div class="elementor-element elementor-element-c6cede5 elementor-widget elementor-widget-text-editor" data-id="c6cede5" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Identity theft is a pervasive form of fraud wherein criminals steal personal information to impersonate bank clients for financial gain. This can lead to unauthorized transactions, fraudulent accounts, or loan applications made in your name.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-a0a99e3 e-flex e-con-boxed e-con e-child" data-id="a0a99e3" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-0c3146a elementor-widget elementor-widget-text-editor" data-id="0c3146a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Red flags to watch for:</h5>								</div>
				<div class="elementor-element elementor-element-c639cb3 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="c639cb3" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Unfamiliar account activity.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Unexpected denials of credit.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Missing mail or statements.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Inability to log into your online account or receiving password change notifications.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-ac16506 elementor-widget elementor-widget-text-editor" data-id="ac16506" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Protect yourself by:</h5>								</div>
				<div class="elementor-element elementor-element-be3b79f elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="be3b79f" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Regularly monitoring your accounts.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Using strong passwords.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Shredding documents containing sensitive information before disposal.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Limiting personal information shared on social media.</span>
									</li>
						</ul>
						</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-c413b6b e-flex e-con-boxed e-con e-child" data-id="c413b6b" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-b73e015 e-con-full e-flex e-con e-child" data-id="b73e015" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-a7c0170 elementor-widget elementor-widget-heading" data-id="a7c0170" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Investment Scams:</h4>				</div>
				<div class="elementor-element elementor-element-e9c19b2 elementor-widget elementor-widget-text-editor" data-id="e9c19b2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Investment scams entice victims with promises of high returns but end up defrauding them of their money. These scams come in various forms, including Ponzi schemes, pyramid schemes, and fake crypto investment opportunities.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-4da4c65 e-flex e-con-boxed e-con e-child" data-id="4da4c65" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-58eef1b elementor-widget elementor-widget-text-editor" data-id="58eef1b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Red flags to watch for:</h5>								</div>
				<div class="elementor-element elementor-element-46b1261 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="46b1261" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Guaranteed returns.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Pressure to invest quickly.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Promises of exclusive or secret investment opportunities.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-cc7b2c2 elementor-widget elementor-widget-text-editor" data-id="cc7b2c2" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Protect yourself by:</h5>								</div>
				<div class="elementor-element elementor-element-7f374f0 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7f374f0" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Thoroughly researching investment opportunities.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Verifying the credentials of financial professionals.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Being skeptical of unsolicited investment offers.</span>
									</li>
						</ul>
						</div>
					</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-14bf189 e-flex e-con-boxed e-con e-child" data-id="14bf189" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-856f0df e-con-full e-flex e-con e-child" data-id="856f0df" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d3869e7 elementor-widget elementor-widget-heading" data-id="d3869e7" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Fraudulent Loan Schemes:</h4>				</div>
				<div class="elementor-element elementor-element-7fc6f96 elementor-widget elementor-widget-text-editor" data-id="7fc6f96" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Fraudulent loan schemes target individuals in need of quick cash, offering loans with upfront fees or high interest rates but failing to deliver the promised funds. These scams often prey on individuals with poor credit or financial difficulties.</p>								</div>
				</div>
		<div class="elementor-element elementor-element-ec1f958 e-flex e-con-boxed e-con e-child" data-id="ec1f958" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
				<div class="elementor-element elementor-element-ac6b218 elementor-widget elementor-widget-text-editor" data-id="ac6b218" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Red flags to watch for:</h5>								</div>
				<div class="elementor-element elementor-element-f75724b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f75724b" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Requests for payment before receiving loan funds.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Promises of guaranteed approval regardless of credit history.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Requests for sensitive personal information.</span>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-82be277 elementor-widget elementor-widget-text-editor" data-id="82be277" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>Protect yourself by:</h5>								</div>
				<div class="elementor-element elementor-element-7a9ab20 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="7a9ab20" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Researching lenders.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Reading loan agreements carefully.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Avoiding deals that seem too good to be true.</span>
									</li>
						</ul>
						</div>
					</div>
				</div>
					</div>
				</div>
				<div class="elementor-element elementor-element-fb0b65f elementor-widget elementor-widget-heading" data-id="fb0b65f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">What You Need to Know:</h4>				</div>
				<div class="elementor-element elementor-element-3c83933 elementor-widget elementor-widget-heading" data-id="3c83933" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">By staying informed and following these proactive measures, you can significantly reduce the risk of falling victim to scams. Remember, your vigilance is your best defense against financial fraud.  Stay safe, stay informed, and together, we can outsmart the scammers.</h5>				</div>
				<div class="elementor-element elementor-element-49a36f4 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="49a36f4" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Bookmark your bank's official website or access it directly through your mobile app. </span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Delete suspicious emails and refrain from clicking any links in them.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Never share personal information, passwords, or verification codes with anyone.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Ignore pop-up ads, unexpected messages, and QR codes from unknown senders.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Use strong, unique passwords and enable multi-factor authentication for all accounts.</span>
									</li>
								<li class="elementor-icon-list-item">
											<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Report suspicious activity immediately to your bank.</span>
									</li>
						</ul>
						</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Don't let scammers catch you off guard. </h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Take proactive steps to protect your personal information and learn how to recognize red flags and safeguard yourself against common scams. </h4>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/cyber-risk-management/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Cyber Security Training and Resources</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/top-scams-affecting-bank-clients-in-canada/">Top scams affecting bank clients in Canada</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top Data Breaches of 2023</title>
		<link>https://partek.ca/top-data-breaches-of-2023/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 17 Apr 2024 12:00:06 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://partek.ca/?p=27633</guid>

					<description><![CDATA[<p>Data breaches are on the rise! The numbers hit an all-time high in 2023. Our latest article delves into the biggest incidents, lessons learned, and how to protect your data.</p>
<p>The post <a href="https://partek.ca/top-data-breaches-of-2023/">Top Data Breaches of 2023</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[		<div data-elementor-type="wp-post" data-elementor-id="27633" class="elementor elementor-27633">
				<div class="elementor-element elementor-element-4371fc4 e-flex e-con-boxed e-con e-parent" data-id="4371fc4" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-6cfc3e8 e-con-full e-flex e-con e-child" data-id="6cfc3e8" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-6df4aa8 elementor-widget elementor-widget-heading" data-id="6df4aa8" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Numbers Hit an All-Time High  :</h4>				</div>
				<div class="elementor-element elementor-element-89a5131 elementor-widget elementor-widget-heading" data-id="89a5131" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Top Data Breaches of 2023</h3>				</div>
		<div class="elementor-element elementor-element-da8831e e-con-full e-flex e-con e-child" data-id="da8831e" data-element_type="container" data-e-type="container">
		<div class="elementor-element elementor-element-956b662 e-con-full e-flex e-con e-child" data-id="956b662" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-f482362 elementor-widget elementor-widget-text-editor" data-id="f482362" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h5>The battle against cyber threats is an ongoing challenge. Unfortunately<span class="s44">, </span><a href="https://www.cybersecuritydive.com/news/data-compromises-record-high/696745/"><span class="s43">2023 has proven to be a watershed year for data breaches</span></a><span class="s44">.</span> Data compromises have surged to an all-time high in the U.S. This is based on data from the first 9 months of the year. Meaning that numbers will only end up higher for the year.</h5>								</div>
				<div class="elementor-element elementor-element-0567c0f elementor-widget elementor-widget-heading" data-id="0567c0f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default">The last data breach record was set in 2021. That year, 1,862 organizations reported data compromises. Through September of 2023, that number was already over 2,100.</h5>				</div>
				</div>
		<div class="elementor-element elementor-element-5d5087b e-con-full e-flex e-con e-child" data-id="5d5087b" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-d08d184 elementor-widget elementor-widget-heading" data-id="d08d184" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">In Q3 of 2023, the top data compromises were:</h4>				</div>
				<div class="elementor-element elementor-element-8a5280b elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="8a5280b" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://hcahealthcare.com/about/privacy-update.dot" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">HCA Healthcare</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.cms.gov/newsroom/press-releases/cms-notifies-additional-individuals-potentially-impacted-moveit-data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Maximus Federal Services</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.freecycle.org/town/GatesNY/notices/125338" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">The Freecycle Network</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.bleepingcomputer.com/news/security/missouri-warns-that-health-info-was-stolen-in-ibm-moveit-data-breach/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">IBM Consulting</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.hipaajournal.com/caresource-facing-multiple-class-action-lawsuits-over-moveit-data-breach/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">CareSource</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://cybernews.com/security/hackers-exposed-duolingo-users-more-available-scraping/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Duolingo</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://health.wusf.usf.edu/health-news-florida/2023-08-09/class-action-lawsuit-filed-against-tampa-general-hospital-over-recent-data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Tampa General Hospital</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://phtech.com/notification.html" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">PH Tech</span>
											</a>
									</li>
						</ul>
						</div>
				</div>
				</div>
				<div class="elementor-element elementor-element-79557b1 elementor-widget elementor-widget-image" data-id="79557b1" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
																<a href="https://www.cybersecuritydive.com/news/data-compromises-record-high/696745/" target="_blank">
							<img loading="lazy" decoding="async" width="1134" height="532" src="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-3.22.07-PM.png" class="attachment-full size-full wp-image-27654" alt="" srcset="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-3.22.07-PM.png 1134w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-3.22.07-PM-300x141.png 300w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-3.22.07-PM-1024x480.png 1024w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-3.22.07-PM-768x360.png 768w" sizes="(max-width: 1134px) 100vw, 1134px" />								</a>
															</div>
				<div class="elementor-element elementor-element-775cfe0 elementor-widget elementor-widget-heading" data-id="775cfe0" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">This data underscores the relentless efforts of cybercriminals to exploit vulnerabilities and access sensitive information. What are the main drivers of this increase? </h4>				</div>
				</div>
					</div>
				</div>
		<div class="elementor-element elementor-element-419ab1a e-flex e-con-boxed e-con e-parent" data-id="419ab1a" data-element_type="container" data-e-type="container">
					<div class="e-con-inner">
		<div class="elementor-element elementor-element-331015d e-con-full e-flex e-con e-child" data-id="331015d" data-element_type="container" data-e-type="container">
				<div class="elementor-element elementor-element-eabf875 elementor-widget elementor-widget-heading" data-id="eabf875" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Size of the Surge</h4>				</div>
				<div class="elementor-element elementor-element-4c510da elementor-widget elementor-widget-text-editor" data-id="4c510da" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The numbers are staggering. </p><p>Data breaches in 2023 reached unprecedented levels, increasingly significantly compared to previous years. The scale and frequency of these incidents is concerning. They emphasize the evolving sophistication of cyber threats. As well as the challenges organizations face in safeguarding their digital assets.</p>								</div>
				<div class="elementor-element elementor-element-d60af93 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="d60af93" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">The average cost of a data breach was $4.45 million in 2023, the highest average on record. </span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.ibm.com/reports/data-breach" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">The average lifecycle of a breach is 277 days from identification to containment.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.cybersecuritydive.com/news/data-compromises-record-high/696745/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Over 2,100 organizations filed data breach notices through the first nine months of 2023, beating the previous record of 1,862 data compromises in 2021.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.verizon.com/business/resources/reports/dbir/2023/master-guide/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">In 2023, 74% of breaches involved a human element.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-aa236a1 elementor-widget elementor-widget-heading" data-id="aa236a1" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Healthcare Sector Under Siege</h4>				</div>
				<div class="elementor-element elementor-element-e25b5a0 elementor-widget elementor-widget-text-editor" data-id="e25b5a0" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>One of the most disturbing trends is the escalating number of breaches in healthcare. Healthcare organizations are the custodians of highly sensitive patient information. As a result, they’ve become prime targets for cybercriminals. The breaches jeopardize patient privacy. They also pose serious risks to the integrity of medical records. This creates a ripple effect that can have long-lasting consequences.</p>								</div>
				<div class="elementor-element elementor-element-f304ce9 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="f304ce9" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.managedhealthcareexecutive.com/view/top-10-largest-healthcare-security-breaches-of-2023" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">In 2023, over 124 million health records were breached in a total of 725 hacking incidents, making it the worst year ever for attacks, according to a study done by The HIPAA Journal. </span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-3bcf2cb elementor-widget elementor-widget-heading" data-id="3bcf2cb" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Ransomware Reigns Supreme</h4>				</div>
				<div class="elementor-element elementor-element-f1be08d elementor-widget elementor-widget-text-editor" data-id="f1be08d" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Ransomware attacks continue to dominate the cybersecurity landscape. Cybercriminals are not merely after data. They are wielding the threat of encrypting valuable information. Then demanding ransom payments for its release. The sophistication of ransomware attacks has increased. Threat actors are employing advanced tactics to infiltrate networks and encrypt data. They are also using many different methods to extort organizations for financial gain.</p>								</div>
				<div class="elementor-element elementor-element-b99e8e3 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="b99e8e3" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://assets.sophos.com/X24WTUEQ/at/c949g7693gsnjh9rb9gr8/sophos-state-of-ransomware-2023-wp.pdf" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Ransomware affected 66% of organizations in 2023, according to Sophos' "The State of Ransomware 2023" report.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-fe57e0c elementor-widget elementor-widget-heading" data-id="fe57e0c" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Supply Chain Vulnerabilities Exposed</h4>				</div>
				<div class="elementor-element elementor-element-4b626af elementor-widget elementor-widget-text-editor" data-id="4b626af" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Modern business ecosystems have an interconnected nature. This has made supply chains a focal point for cyberattacks. The compromise of a single entity within the supply chain can have cascading effects. It can impact several organizations downstream. Cybercriminals are exploiting these interdependencies. They use vulnerabilities to gain unauthorized access to a network of interconnected businesses.</p>								</div>
				<div class="elementor-element elementor-element-d1a44fb elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="d1a44fb" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.statista.com/statistics/1367208/us-annual-number-of-entities-impacted-supply-chain-attacks/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">In 2023, supply chain cyber attacks in the United States impacted 2769 entities. This is the highest reported number since 2017. In the last measured year, the number of affected entities has increased by approximately 58 percent year-over-year. The impacted entities have access to multiple organizations' data, which represents a significant risk for organizations.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-5a51418 elementor-widget elementor-widget-heading" data-id="5a51418" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Emergence of Insider Threats</h4>				</div>
				<div class="elementor-element elementor-element-bd00e86 elementor-widget elementor-widget-text-editor" data-id="bd00e86" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>External threats remain a significant concern. But the rise of insider threats is adding a layer of complexity. It&#8217;s added to the already complex cybersecurity landscape. Insiders inadvertently contribute to data breaches. Whether through malicious intent or unwitting negligence. Organizations are now grappling with a challenge. They need to distinguish between legitimate user activities and potential insider threats.</p>								</div>
				<div class="elementor-element elementor-element-4fd703d elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="4fd703d" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.statista.com/statistics/1367208/us-annual-number-of-entities-impacted-supply-chain-attacks/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">An insider threat refers to a security risk that originates from individuals within an organization, such as employees, contractors, or business partners, who misuse their authorized access to compromise the confidentiality, integrity, or availability of the organization's data, systems, or resources. Insider threats can be intentional or unintentional and may result from malicious actions, negligence, or ignorance. </span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-1531cb2 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="1531cb2" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.statista.com/statistics/1367208/us-annual-number-of-entities-impacted-supply-chain-attacks/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Last year, approximately 31% of all data breaches were caused by insider threats, implying that one-third of all data breaches emerged from an insider, a contractor, or an employee. Also, the average cost of an insider threat records a staggering $8.76 million globally.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-33cf782 elementor-widget elementor-widget-image" data-id="33cf782" data-element_type="widget" data-e-type="widget" data-widget_type="image.default">
																<a href="https://www.ekransystem.com/en/blog/insider-threat-statistics-facts-and-figures#:~:text=Any%20company%20can%20have%20a,were%20caused%20by%20user%20negligence." target="_blank">
							<img loading="lazy" decoding="async" width="1189" height="489" src="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-4.09.20-PM.png" class="attachment-full size-full wp-image-27662" alt="" srcset="https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-4.09.20-PM.png 1189w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-4.09.20-PM-300x123.png 300w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-4.09.20-PM-1024x421.png 1024w, https://partek.ca/wp-content/uploads/2024/04/Screen-Shot-2024-04-08-at-4.09.20-PM-768x316.png 768w" sizes="(max-width: 1189px) 100vw, 1189px" />								</a>
															</div>
				<div class="elementor-element elementor-element-ff29682 elementor-widget elementor-widget-heading" data-id="ff29682" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<p class="elementor-heading-title elementor-size-default"><a href="https://www.ekransystem.com/en/blog/insider-threat-statistics-facts-and-figures#:~:text=Any%20company%20can%20have%20a,were%20caused%20by%20user%20negligence." target="_blank">Credit: Ekran System</a></p>				</div>
				<div class="elementor-element elementor-element-b0bca31 elementor-widget elementor-widget-heading" data-id="b0bca31" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">IoT Devices as Entry Points</h4>				</div>
				<div class="elementor-element elementor-element-dcebdf6 elementor-widget elementor-widget-text-editor" data-id="dcebdf6" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>The proliferation of Internet of Things (IoT) devices has expanded the attack surface. There’s been an uptick in data breaches originating from compromised IoT devices. These connected endpoints range from smart home devices to industrial sensors. They are often inadequately secured. This provides cyber criminals with entry points to exploit vulnerabilities within networks.</p>								</div>
				<div class="elementor-element elementor-element-db63a37 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="db63a37" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.statista.com/statistics/1367208/us-annual-number-of-entities-impacted-supply-chain-attacks/" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Last year, approximately 31% of all data breaches were caused by insider threats, implying that one-third of all data breaches emerged from an insider, a contractor, or an employee. Also, the average cost of an insider threat records a staggering $8.76 million globally.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-90b8c5f elementor-widget elementor-widget-heading" data-id="90b8c5f" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">Critical Infrastructure in the Crosshairs</h4>				</div>
				<div class="elementor-element elementor-element-9e7a03a elementor-widget elementor-widget-text-editor" data-id="9e7a03a" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Critical infrastructure has become a target of choice for cyber attackers. This includes energy grids, water supplies, and transportation systems. The potential consequences of a successful breach in these sectors are often financial. But that’s not all. They can also extend to public safety and national security. As cyber threats evolve, safeguarding critical infrastructure has become an urgent imperative.</p>								</div>
				<div class="elementor-element elementor-element-32ebdcd elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="32ebdcd" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.securityinfowatch.com/security-executives/article/53069429/why-critical-infrastructure-is-the-new-target" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Critical infrastructure has always been a primary target of threat actors and different governments, for many reasons, including its impact on a nation's economy and resources and for financial gain.</span>
											</a>
									</li>
								<li class="elementor-icon-list-item">
											<a href="https://www.securityinfowatch.com/security-executives/article/53069429/why-critical-infrastructure-is-the-new-target" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">Many critical infrastructure sectors rely on control systems such as Supervisory Control and Data Acquisition (SCADA) and Programmable Logic Controllers (PLC) to control and monitor devices. However, these systems introduce new cybersecurity vulnerabilities that must be monitored and secured.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-6183043 elementor-widget elementor-widget-heading" data-id="6183043" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The Role of Nation-State Actors</h4>				</div>
				<div class="elementor-element elementor-element-8a7613b elementor-widget elementor-widget-text-editor" data-id="8a7613b" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<p>Geopolitical tensions have spilled into the digital realm. Nation-state actors are increasingly playing a role in sophisticated cyber campaigns. These actors are often driven by political motives. They use advanced techniques to compromise sensitive data and disrupt operations. This is to advance their strategic interests in the global cyber landscape.</p>								</div>
				<div class="elementor-element elementor-element-02477e2 elementor-align-start elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list" data-id="02477e2" data-element_type="widget" data-e-type="widget" data-widget_type="icon-list.default">
							<ul class="elementor-icon-list-items">
							<li class="elementor-icon-list-item">
											<a href="https://www.securityinfowatch.com/security-executives/article/53069429/why-critical-infrastructure-is-the-new-target" target="_blank">

												<span class="elementor-icon-list-icon">
							<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>						</span>
										<span class="elementor-icon-list-text">A Nation-State Actor refers to a government or governmental agency that conducts cyber activities for strategic, political, economic, or military purposes. These actors possess significant resources, including advanced technical capabilities and funding, and operate with the backing and support of their respective nation-states.  Nation-State Actors engage in various cyber activities, ranging from espionage and intelligence gathering to sabotage, disruption, and cyber warfare.</span>
											</a>
									</li>
						</ul>
						</div>
				<div class="elementor-element elementor-element-f429721 elementor-widget elementor-widget-heading" data-id="f429721" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">The Need for a Paradigm Shift in Cybersecurity</h3>				</div>
				<div class="elementor-element elementor-element-4444ace elementor-widget elementor-widget-text-editor" data-id="4444ace" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
									<h4>The recent surge in data breaches highlights the critical importance of reevaluating cybersecurity strategies. With cyber threats evolving and becoming more sophisticated, organizations must acknowledge that it&#8217;s not a matter of if they will be targeted, but rather when. To effectively combat these threats, proactive measures are essential.</h4><p>Implementing robust cybersecurity frameworks is the foundation of a strong defense. This involves establishing comprehensive policies, procedures, and technologies to protect against a wide range of cyber threats. A thorough framework encompasses elements such as <b>network security, endpoint protection, access controls, encryption, and incident response protocols.</b></p><p><b>Continuous monitoring</b> is another crucial component of proactive cybersecurity. By continuously monitoring networks, systems, and applications for suspicious activities or anomalies, organizations can detect potential threats early and respond swiftly to mitigate damage. This proactive approach helps prevent breaches from escalating into full-blown cyber incidents.</p><p>Equally important is fostering a <b>culture of cyber awareness</b> throughout the organization. Employees are often the first line of defense against cyber threats, but they can also be the weakest link if they&#8217;re not properly trained and educated. Promoting cyber awareness involves providing regular training sessions, conducting simulated phishing exercises, and encouraging employees to remain vigilant and report any security incidents promptly.</p><p>At Partek IT Solutions, we understand the urgency and complexity of modern cybersecurity challenges. Our team of experts specializes in designing and implementing tailored cybersecurity solutions to address the specific needs and risks faced by your organization. Whether you&#8217;re looking to enhance your existing cybersecurity measures, implement new technologies, or train your staff — we&#8217;re here to help. </p><p><span style="text-align: var(--text-align); letter-spacing: 0.2px;">Don&#8217;t wait until it&#8217;s too late—take proactive steps today to safeguard your organization&#8217;s sensitive data and reputation. <a href="https://partek.ca/contact/">Contact us</a> now to learn more about how we can help strengthen your cybersecurity posture and protect your business from cyber threats.</span></p>								</div>
				</div>
					</div>
				</div>
				<section class="elementor-section elementor-top-section elementor-element elementor-element-9914193 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="9914193" data-element_type="section" data-e-type="section" data-settings="{&quot;background_background&quot;:&quot;classic&quot;}">
						<div class="elementor-container elementor-column-gap-wider">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f64da7" data-id="9f64da7" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-1cbfc43 elementor-widget elementor-widget-heading" data-id="1cbfc43" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h3 class="elementor-heading-title elementor-size-default">Protect Your Business from Devastating Data Breaches</h3>				</div>
				<div class="elementor-element elementor-element-1257102 elementor-widget elementor-widget-heading" data-id="1257102" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h4 class="elementor-heading-title elementor-size-default">The surge in data breaches in 2023 serves as a stark reminder. It reminds us of the evolving and pervasive nature of cyber threats. There is an urgent need for heightened cybersecurity awareness and robust defensive measures. As well as a commitment to adapt to the ever-changing tactics of cybercriminals.</h4>				</div>
				<div class="elementor-element elementor-element-e3bfb76 elementor-widget elementor-widget-heading" data-id="e3bfb76" data-element_type="widget" data-e-type="widget" data-widget_type="heading.default">
					<h5 class="elementor-heading-title elementor-size-default"><a href="tel:4034883333">Need help protecting your business? Give us a call at (403) 488-333 to chat.</a></h5>				</div>
				<div class="elementor-element elementor-element-8eba112 elementor-align-center elementor-widget elementor-widget-button" data-id="8eba112" data-element_type="widget" data-e-type="widget" data-widget_type="button.default">
										<a class="elementor-button elementor-button-link elementor-size-md" href="https://partek.ca/contact/">
						<span class="elementor-button-content-wrapper">
						<span class="elementor-button-icon">
				<svg aria-hidden="true" class="e-font-icon-svg e-fas-arrow-right" viewBox="0 0 448 512" xmlns="http://www.w3.org/2000/svg"><path d="M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z"></path></svg>			</span>
									<span class="elementor-button-text">Get in touch</span>
					</span>
					</a>
								</div>
					</div>
		</div>
					</div>
		</section>
				</div>
		<p>The post <a href="https://partek.ca/top-data-breaches-of-2023/">Top Data Breaches of 2023</a> appeared first on <a href="https://partek.ca">Partek I.T. Solutions</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
