Axis Insurance News & Insights

Subscribe and stay updated to the latest news and insights

3 Ways You Can Keep Your Organization’s Website Safe and Secure

Website security is more important than ever. Cyber criminals are constantly looking for improperly secured websites to attack;...


( read )

Tags: Cyber

10 Tips for How to Avoid Becoming a Victim of Phishing Attacks

Cyber security is more important than ever. Cyber criminals are constantly looking for improperly secured websites to attack;...


( read )

Tags: Cyber

How Your Information and Data Are Compromised in a Cyber Attack

While most phishing attacks are sent by way of email or deceptive websites, cyber criminals can take many other approaches. The...


( read )

Tags: Cyber

How to Detect and Overcome Cryptojacking Attempts

Cybercrimes are becoming an increasing threat to organizations. There are even various types of cyberattacks to be aware of now,...


( read )

Tags: Cyber

How to Respond to a Cyberattack Resulting in a Data Breach

Data breach response policies are essential for organizations of any size. A response policy should outline how your company will...


( read )

Tags: Cyber

4 Considerations to Keep In Mind to Physically Protect Cyber Assets

When it comes to securing cyber assets, many people often think of only mitigating cyber risks like spam, phishing and malware....


( read )

Tags: Cyber

The Importance of Cyber Coverage and How It Can Protect Your Business

Cyber security is a top-of-mind risk for organizations of all sizes and across all industries. One cyberattack can be detrimental...


( read )

Tags: Cyber

The Fraudulent CEO Cyber Scam You Need to Watch Out For

Phishing attacks have increased phenomenally in the last year since more and more organizations began having employees work from...


( read )

Tags: Cyber

The Urgent Request Cyber Scam You Need to Not Fall Victim To

Phishing attacks have increased phenomenally in the last year since more and more organizations began having employees work from...


( read )

Tags: Cyber

How Cyber Criminals Choose Their Phishing Targets and Method of Attack

Both phishing and spear-phishing scams can affect anyone. Phishing attacks are more expansive and don’t necessarily have a...


( read )

Tags: Cyber

How to Identify the Differences Between Phishing and Spear Phishing

Often, the terms phishing and spear phishing are used interchangeably. However, there is a key distinction between these two...


( read )

Tags: Cyber

How Cyber Criminals Plan Their Phishing Attacks Against Organizations

Cyber criminals have a variety of tools and techniques at their disposal, including malware, ransomware and disrupted...


( read )

Tags: Cyber

How to Protect Yourself From Cybersecurity Threats in a 5G World

As the fifth generation (5G) mobile network becomes increasingly accessible, cybersecurity risks also increase. While 5G has many...


( read )

Tags: Cyber

4 Types of Cyber Attacks That Commonly Target the Agriculture Sector

The agriculture sector is a key part of Canada’s economy, trade and food supply. A cybersecurity breach could be detrimental to...


( read )

Tags: Cyber, Agribusiness

How Remote Working Burnout Becomes a Factor in Cybersecurity Risks

Human error is one of the largest threats to the cybersecurity of an organization. As remote work continues due to the COVID-19...


( read )

Tags: Cyber

How Human Errors Can Cause Cybersecurity Breaches to Your Organization

The IBM Cyber Security Intelligence Index Report found that human error is a major contributing cause in 95 per cent of...


( read )

Tags: Cyber

COVID-19’s Impact on Cyber Threats Targeting Organizations

A cybersecurity crisis emerged as a result of the 2020 global health crisis as cybercriminals posed an increased threat to the...


( read )

Tags: Cyber

10 Cybersecurity Tips to Protect Your Small Business

High-profile cyber attacks have raised awareness of the growing threat of cyber crime.

The vast majority of small businesses lack...


( read )

Tags: Cyber

Attack on Accountants: Impact of Cybersecurity Breaches and Data Hacks

As we rely more and more on technology and companies have their employees work from home, the risk of having a cybersecurity...


( read )

Tags: Cyber, Professional & Financial Services

4 Most Common Types of Phishing Scams to Watch Out For

Among the various forms of cyberattacks, phishing – a scamming method that tricks users into supplying sensitive information that...


( read )

Tags: Cyber

5 Cyber Security Tips for Working Remotely at Home

The recent significant increase in employees working from home as a result of the COVID-19 pandemic brings with it an increased...


( read )

Tags: Cyber

8 Tips to Identify and Avoid Email Phishing Scams

More than 3 billion phishing emails are sent out worldwide every day. Scammers use these emails to try to trick people into...


( read )

Tags: Cyber

Top 3 Cyber Threats You Need to Watch Out for in 2021

With the shift to most organizations having their employees work from home in 2020, the world continues to rely more and more on...


( read )

Tags: Cyber

How to Protect Against Work from Home Cyberattacks During COVID-19

 

In North America, many individuals will still be completing their first month working from home due to COVID-19. While most...


( read )

Tags: Cyber

Defining, Identifying and Limiting Cyber Crime

A vast amount of information is now stored on computer servers and databases, and it’s growing every day. Because that...


( read )

Tags: Cyber

Mobile Device Cyber Security (Pt. 2)

If your company uses mobile devices to conduct company business, such as accessing company email or sensitive data, pay close...


( read )

Tags: Cyber

Mobile Device Cyber Security (Pt. 1)

Because of their convenience, smartphones and tablet devices have become a universal presence in the modern business world. As...


( read )

Tags: Cyber

7 Basic Cyber Loss Control Techniques

Protecting your business from cyber risks can be an overwhelming venture. With each passing month, new and more sophisticated...


( read )

Tags: Cyber

How to Create a Safe & Secure Network

 

As the amount of sensitive information on your computer network grows, so too does the need for appropriate measures to ensure...


( read )

Tags: Cyber

Benefits of Cyber Liability Insurance

 

When cyber attacks like data breaches and hacks occur, they can result in devastating damage. Businesses have to deal with...


( read )

Tags: Cyber

How to Prevent & Respond to a Cyber Attack

 

Unlike physical threats that prompt immediate action—like stopping, dropping and rolling if you catch on fire—cyber threats are...


( read )

Tags: Cyber

Protecting Financial Institutions Against Security Breaches

 

Financial institutions are top targets for security breaches. Though the media often reminds us of high-profile network leaks,...


( read )

Tags: Cyber, Professional & Financial Services

Data Breaches: A Growing D&O Concern

 

A data breach can be a devastating event, affecting a company financially and damaging its reputation with customers. But as a...


( read )

Tags: Cyber, D&O

10 Easy Ways to Improve Cyber Security for Your Small Business

 

High-profile cyber attacks on companies such as Target and Sony have generated national headlines and have raised awareness of...


( read )

Tags: Cyber

What the GDPR Means for Canadian Businesses

 

With the severity of cyber attacks increasing on what seems like a daily basis, governments are now stepping in to provide...


( read )

Tags: Cyber

Your 4 Steps to Respond to a Data Breach

 

No company, big or small, is immune to a data breach. Many small employers falsely believe they can elude the attention of a...


( read )

Tags: Cyber

Cyber Criminal Attack Strategies (pt.2)

 

In part 2 of our Cyber Criminal Attack Strategies, we take a deep dive on the most common methods used by cyber criminals to...


( read )

Tags: Cyber

Cyber Criminal Attack Strategies (pt.1)

 

While the content of phishing and spear-phishing emails can vary, cyber criminals often employ similar strategies and tactics....


( read )

Tags: Cyber

Phishing versus Spear Phishing

 

Often, the terms phishing and spear phishing are used interchangeably. However, there is a key distinction between these two...


( read )

Tags: Cyber

The Costs of a Data Breach
By Axis Marketing On September 25, 2019

The Costs of a Data Breach

 

Whether your business is a Fortune 500 company or a small, family-run business, data security needs to be a top priority. Small...


( read )

Tags: Cyber

Disaster Planning and How It Will Help You Respond to a Data Breach

 

Statistically one in five Canadian businesses will fall victim to a cyberattack. Whether sensitive information is compromised...


( read )

Tags: Cyber

The Real Cyber Security Risks of Today’s Mining Operations

 

Rob Labbe, a Canadian, is the co-founder of the Mining and Metals Information Sharing and Analysis Centre. When addressing the...


( read )

Tags: Cyber, Energy, Resources & Renewables

How cyber insurance responds to GDPR requirements

Earlier this year, the European Union’s General Data Protection Regulation (GDPR) went into effect, placing new obligations on...


( read )

Tags: Cyber

Why cyber criminals target small and medium sized businesses

The news is peppered with stories about cyberattacks on large corporations and even large municipalities like Atlanta. These...


( read )

Tags: Cyber

Cyber liability claims examples - Why your business needs coverage

 When you hear about cyber attacks and "data breaches, many people think of a rogue hacker infiltrating a computer system to...


( read )

Tags: Cyber

Cyberattacks top list of biggest threats to businesses in 2018

On the World Economic Forum’s (WEF) list of things businesses around the world should be on the lookout for this year,...


( read )

Tags: Cyber

Cyber security a growing threat to small and medium sized businesses

While cyberattacks on large corporations are becoming ever more common in the news, smaller and medium sized businesses are...


( read )

Tags: Cyber

Cyber Insurance becomes a necessity

[This article was originally published in Roofing BC magazine.]

It's hard to avoid the headlines about cybery crimes; every week...


( read )

Tags: Construction, Contractors & Real Estate, Cyber

Let us know how we can help you today.

At Axis we provide all lines of commercial and personal insurance. We would love to speak with you.