The Upstart Engines

Posted by & filed under Accounting Careers, Data security.

Description: There’s probably not much chance that any of the search engines like Neeva, DuckDuckGo, or You.com will supplant Google as the world’s number one search engine anytime soon. Google owns over 90% of the market, with Microsoft’s Bing the next largest at roughly 2.5%. Yet, by offering more privacy, fewer ads, and better results,… Read more »

Gray Wolf to the Rescue

Posted by & filed under Data security.

Description: When the City of Fredericton’s Instagram account was hacked recently, City officials knew where to turn. Enter Gray Wolf Analytics, a local cybersecurity company that had already been in talks with city hall regarding a pilot project. Gray Wolf used its cryptocurrency expertise to upend an attempted ransom demand and to provide valuable intelligence… Read more »

The Texas Cold Crisis

Posted by & filed under Canadian governments, Corporate Strategy.

Description: In an extraordinary week of cold weather, Texas has been dealing with a crisis. Power failures left many Texans in the cold, then freezing water pipes and crippled water treatment plants created a shortage of clean drinking water. This crisis may prompt governments and utilities in North America to consider just how resilient our… Read more »

Big $ for St. John’s Firm

Posted by & filed under Data security.

Description: Nasdaq is looking to buy the St. John’s based online security firm Verafin for $2.75 billion. Verafin’s security reach extends to tracking down elusive financial crime, such as money laundering. The plan is to keep the firm in Newfoundland and Labrador, with Nasdaq’s global client base offering an excellent opportunity to grow the business…. Read more »

Now That’s a Hack

Posted by & filed under Data security, Personal Tax.

Description: Several weeks after a cyber-attack, the Canada Revenue Agency (CRA) reports that it is “working diligently to restore access to all services as quickly as possible.” Taxpayers have found some of the familiar online services are still not being offered. The CRA says that the fact that some of its employees have been working… Read more »

Zoom With Care

Posted by & filed under Data security, Financial Accounting, Student life.

Description: Business, schools, and individuals have been quickly learning all about the Zoom, the software that has allowed many to link live with friends and colleagues during this time of social distancing. You should be aware, however, that hackers see Zoom as a new opportunity to mess with you and your data. The Toronto Star… Read more »

Now There Are 3

Posted by & filed under Corporate Strategy, Financial Reporting and Analysis.

Description: US cellular customers are now dealing with a world in which there are only 3 major carriers. T-Mobile has received regulatory approval to purchase Sprint. Along with the deal, T-Mobile has promised to hold the line on rates and to improve service in rural areas. Some critics maintain that it will be very difficult… Read more »

HBC Going Private

Posted by & filed under Corporate Strategy.

Description: HBC is no longer going to be a publicly-traded company. Chairman Richard Baker won a shareholders’ vote in his third bid to take the company private. In June 2019 Baker offered $9.45 a share, but this drew negative shareholder reaction. By this January the offer was sweetened to $11 per share, and 98% of… Read more »

$ 3 Million Ransom

Posted by & filed under Data security.

Description: The hackers are keeping busy. Travelex, a company dealing in foreign exchange transactions, has been hit by a virus. Reports say the hackers are holding Travelex to a $3 million ransom under the threat of releasing personal data. In the interim, the company’s outlets at various airports will use manual processes to exchange currency…. Read more »

Already?

Posted by & filed under Data security, Ethics.

Description: It’s already happening. Last week, Disney launched streaming service DisneyPlus; this week user accounts and passwords started showing up on hacker websites. Now that’s what I call efficiency! Unfortunately, it’s the type of efficiency that comes by exploiting system weaknesses. Professor Paul Rohmeyer, from the Stevens Institute of Technology in New Jersey, said he… Read more »