Innovation, Data and Technology Insights

Image for Is Your Business Name Adequately Protected?

Is Your Business Name Adequately Protected?

Image for How to Protect Your Customers from “Credential-Stuffing” Attacks

How to Protect Your Customers from “Credential-Stuffing” Attacks

Image for The Cost of Ransomware Attacks Continues to Grow

The Cost of Ransomware Attacks Continues to Grow

Image for Canada Extends Copyright Protection by 20 Years

Canada Extends Copyright Protection by 20 Years

Image for Am I Committing Copyright Infringement by Taking Inspiration from Another’s Work?

Am I Committing Copyright Infringement by Taking Inspiration from Another’s Work?

Image for Are You Required to Provide a Breach Notification?

Are You Required to Provide a Breach Notification?

Image for Can a Robot’s Artwork Be Copyrighted?

Can a Robot’s Artwork Be Copyrighted?

Image for Most Breaches Have Potential to Cause Significant Harm, Report Finds

Most Breaches Have Potential to Cause Significant Harm, Report Finds

Image for To BCC or Not to BCC? That Is the Question

To BCC or Not to BCC? That Is the Question

Image for Protecting Indigenous Traditional Knowledge Through Trademarks

Protecting Indigenous Traditional Knowledge Through Trademarks