Services About Insights Pricing Contact

Security Insights

Expert tips, industry trends, and practical advice to keep your business secure.

The Bitwarden npm Supply Chain Attack: When Security Tools Become Attack Vectors
Business Security April 24, 2026

The Bitwarden npm Supply Chain Attack: When Security Tools Become Attack Vectors

For roughly 90 minutes on April 22, 2026, a trojanized version of the Bitwarden CLI sat on npm — the password manager's own developer tool turned credential thief. Here's what the incident really tells Canadian and US business leaders about supply chain trust in 2026.

Read Article →
When Your AI Goes Dark: Why Businesses Need a Continuity Plan for LLM Outages
Business Security April 21, 2026

When Your AI Goes Dark: Why Businesses Need a Continuity Plan for LLM Outages

ChatGPT, Claude, and every other LLM will have outages — it has already happened, and it will happen again. If your business can't operate without them, that's a single point of failure. Here's how to plan for AI outages, export what you can, and reduce your exposure to vendor lockouts.

Read Article →
The Vercel Breach: How One AI Tool's Google Workspace OAuth Token Exposed Hundreds of Organizations
Business Security April 20, 2026

The Vercel Breach: How One AI Tool's Google Workspace OAuth Token Exposed Hundreds of Organizations

Vercel was breached after an employee granted a third-party AI tool unrestricted access to Google Workspace. Here's what happened, how to check if your organization is affected, and why vetting the OAuth apps connected to your Microsoft 365 or Google tenant matters more than ever.

Read Article →
SaaS Security for Small Businesses: How to Vet Vendors in the AI Era
Business Security April 18, 2026

SaaS Security for Small Businesses: How to Vet Vendors in the AI Era

Most small businesses don't run their own web apps — they run on SaaS. AI has now shrunk the window between a disclosed bug and a live exploit to hours. Here's how to evaluate your SaaS providers, protect your backups, and keep your own apps off the public internet.

Read Article →
AI Meeting Recorders Are Collecting More Than You Think
Privacy April 7, 2026

AI Meeting Recorders Are Collecting More Than You Think

We reviewed the privacy policies of six popular AI meeting and note-taking tools — Otter.ai, Fathom, Fellow.ai, Read.ai, Microsoft Copilot, and Google Gemini. What we found surprised us. Here's what businesses need to know before their next meeting.

Read Article →
AI Security Checklist: 7 Steps Every Small Business Should Take Now
AI Security April 6, 2026

AI Security Checklist: 7 Steps Every Small Business Should Take Now

AI tools are everywhere in the workplace — and so are the risks. Here's a practical checklist for small businesses to secure their AI usage before it becomes a liability.

Read Article →
Why Most Businesses Still Fail Password Audits — And How to Fix It
Security Best Practices April 5, 2026

Why Most Businesses Still Fail Password Audits — And How to Fix It

NIST rewrote the rules, but most organizations haven't caught up. Here's what a modern password audit actually looks for and where businesses consistently fall short.

Read Article →
Phishing-as-a-Service: Why Credential Theft Platforms Are a Growing Threat to Businesses
Email Security April 3, 2026

Phishing-as-a-Service: Why Credential Theft Platforms Are a Growing Threat to Businesses

Phishing kits have evolved from crude hacker tools into polished, subscription-based platforms with built-in evasion and MFA bypass. Here's what that shift means for your business security.

Read Article →
The Claude Code Source Code Leak: What Businesses Using AI Coding Tools Need to Know
AI Security April 2, 2026

The Claude Code Source Code Leak: What Businesses Using AI Coding Tools Need to Know

Anthropic accidentally published 512,000 lines of Claude Code source code to npm. Here's what was exposed, what it means for businesses relying on AI development tools, and the broader security questions every organization should be asking.

Read Article →
Two Chrome Zero-Days Exploited in the Wild: What CVE-2026-3909 and CVE-2026-3910 Mean for Your Business
Browser Security March 31, 2026

Two Chrome Zero-Days Exploited in the Wild: What CVE-2026-3909 and CVE-2026-3910 Mean for Your Business

Google has patched two actively exploited Chrome zero-day vulnerabilities affecting 3.4 billion users. Here's what happened, why the patch window is shrinking, and what your business should do right now.

Read Article →
The Axios Supply Chain Attack: What 100 Million Weekly Downloads of Compromised Code Means for Your Business
Business Security March 31, 2026

The Axios Supply Chain Attack: What 100 Million Weekly Downloads of Compromised Code Means for Your Business

A live supply chain attack on axios—one of npm's most depended-on packages—injected malware through a malicious dependency. Here's what happened, how supply chain attacks work, and what your business should do to protect itself.

Read Article →
Introducing CybersecurityCanada.ca: A Free Cybersecurity Assessment for Canadian Businesses
Business Security March 22, 2026

Introducing CybersecurityCanada.ca: A Free Cybersecurity Assessment for Canadian Businesses

We've launched CybersecurityCanada.ca — a free, comprehensive cybersecurity assessment built on the Canadian Centre for Cyber Security (CCCS) framework. Designed for any Canadian business, no technical expertise required.

Read Article →