
Technology
2023 IABA Annual Meeting
Last week, Actuarial’s Anders Beyer and Caroline Palen joined HR’s Patty Cadogan and Carole Chiossi at the International Association of Black Actuaries (IABA) annual conference in Chicago. The IABA is a unique community of both students and experienced actuaries in an...
The Intact Charitable Trust Gives Back During the Holidays 2022
Over the holidays, the Intact Charitable Trust contributed donations totaling $60,000 to nonprofits across the country, specifically in local communities where Intact Insurance Specialty Solutions has a presence. Below is a list of nonprofits we were pleased to...
Tech Whitepaper Now Available: Edge Computing – An Overview
“Alexa, what’s the weather?” “Hey Siri, preheat the oven to 350 degrees.” A simple spoken command is all it takes for many people to obtain information or interact with their appliances today. Similarly, in the not-too-distant future, instead of asking for directions...
New Year, New Cyber Threats
Cybercriminals and nation-state actors capitalize on their past successes. They become progressively agile as they exploit current events and new technologies. Emergent Cyber Threats Concerns about cyber threats continue to mount. In December 2021, the United States...
Intact Charitable Trust gives back during the holidays
Over the holidays, the Intact Charitable Trust contributed donations totaling $60,000 to nonprofits across the country, specifically in local communities where Intact Insurance Specialty Solutions has a presence. Below is a list of nonprofits we were pleased to...
‘Tis the Season for Holiday Scams
Busy and distracted online shoppers are prime targets for cyber scams. This season’s stressors include supply chain issues and shipping delays along with low stock and rising prices fueled by increased consumer demand. Predictably, cyber criminals will capitalize on...
The Rise of Synthetic Content and Deepfakes
What is Synthetic Content? The Federal Bureau of Investigation defines synthetic content as a broad spectrum of generated or manipulated digital content that includes images, video, audio, and text. In other words, it is content that has been automatically created....
Do smart devices mean smart security?
The IoT (Internet of Things) is a system of interrelated computing devices and objects that transfer data over a network without requiring human-to-human or human-to-computer interaction. The devices are connected to the internet that share data with other devices and...
Understanding the science behind Phishing attacks, and how to prevent them
Fight the Phish… and the Lizard Social engineering continues to be one of the most common cyber-attack strategies. Phishing, a form of social engineering attack, was the most common type of cybercrime in 2020, according to the Federal Bureau of Investigation. Scammers...
October is Cybersecurity Awareness Month
This year marks the 18th year of observing cybersecurity awareness month – and initiative co-led by the United States Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity Alliance (NCSA). The goal is to build awareness about the...