this post was submitted on 15 Jun 2025
30 points (100.0% liked)

Canada

9935 readers
391 users here now

What's going on Canada?



Related Communities


🍁 Meta


🗺️ Provinces / Territories


🏙️ Cities / Local Communities

Sorted alphabetically by city name.


🏒 SportsHockey

Football (NFL): incomplete

Football (CFL): incomplete

Baseball

Basketball

Soccer


💻 Schools / Universities

Sorted by province, then by total full-time enrolment.


💵 Finance, Shopping, Sales


🗣️ Politics


🍁 Social / Culture


Rules

  1. Keep the original title when submitting an article. You can put your own commentary in the body of the post or in the comment section.

Reminder that the rules for lemmy.ca also apply here. See the sidebar on the homepage: lemmy.ca


founded 4 years ago
MODERATORS
 

The head of Canada's cyber-defence agency is offering some insight just weeks after a ransomware attack against Nova Scotia Power.

The utility's computer systems were breached by ransomware hackers on March 19, but Nova Scotia Power did not discover it until April 25. The company disclosed the cybersecurity incident three days after that.

About 280,000 customers — more than half of the utility's customers in the province — were informed by letter that their personal information may have been compromised in the attack. The data included names, addresses, phone numbers, birth dates, driver's licences, social insurance numbers and banking information.

On Thursday, the Nova Scotia Energy Board granted approval to Nova Scotia Power to move forward with a $1.8-million project to improve cybersecurity.

top 4 comments
sorted by: hot top controversial new old
[–] ag10n@lemmy.world 5 points 16 hours ago (1 children)

SINs were included but the article doesn’t elaborate

This is a big fuck up and heads should roll

[–] vipaal@aussie.zone 1 points 16 hours ago

Looks at Optus Australia, Medibank Australia Yea, nah not really Governments might find it easier to do something for the noisy customers at best

[–] teppa@piefed.ca 1 points 16 hours ago* (last edited 16 hours ago) (1 children)

One of the things that we've been very mindful of … as the world gets more hostile, we're worried about impacts to critical infrastructure like electrical guide grids, pipelines, these sorts of things. A lot of them are controlled by systems that were never meant to be connected to the Internet. Nowadays, as people are looking to optimize efficiency, and connect to cloud services and connect sensors to networks, they're becoming more exposed to threat actors from around the world. Normally, your electrical grid would only be threatened by people that are actually in the country and nearby, but as soon as you connect it to the internet, you're pretty much opening a lot of this up to people from anywhere.

This is why you need to use a Scada system like Ignition, which can replicate the database to a cloud or IT environment, and any non-administrators should be using that. Remote access for admins should be done via a PAM software running in a web browser, and optimally only accessible from a locked down Chromebook style device that cant run executables.

[–] nik282000@lemmy.ca 1 points 15 hours ago

All of what you just typed translates to $$$ for the MBAs. Until management starts being publicly and severely punished for their fuckups you can look forward to your personal information being stolen and sold over and over for the rest of your life :)