Thank you!

by Gina Savoie


What would be ProActive Risk Management without its loyal team and partners? We are about to end a very interesting year which gave us the chance to meet a lot of new amazing people and to keep building strong foundations with all our partners.

The future is bright and we will all work together to achieve new goals!

A special greeting at Christmas time to express to you our sincere appreciation for your confidence and loyalty. We are deeply thankful and extend to you our best wishes for a happy and healthy holiday season.

Gina Savoie



All experts agree to say that this is the era of cyber threat.  It is not “if” anymore but “when”.

Preparation, strategic communications and response time are critical to reputation management.

In the event of a cyber-attack, data leakage or any other sort of cyber security issues, the first thing to do is… keep calm!  Do not panic.  Over-reacting can lead to wrong decisions that can cause greater damages to the company.

First and foremost, is to investigate and validate the problem.  When did this happen?  How? What is the extent?  The cause?  How to resolve it.  We recommend to bring a third-party organization early in the process to discover the scope and implications of the situation, as well as a demonstration that the firm is taking the problem seriously.  The specialist will transparently help you discover what information has been accessed, compromised and will identify what vulnerabilities are in cause.  This will remediate and prevent the issue of happening again.

This will determine the communication plan.  Whether or not to go public or restrain the communication to the parties affected depends on the analysis and extent of damages.  An experienced consultant in Public Relations may be of a tremendous value to coordinate the efforts, communication and to ensure that all parties such as IT, Legal, BOD and C level executives are in sync in their plan of action.  

A single voice message must be developed for all potential victims, employees, customers, partners and the media. The statement must be open and sincere.  Apologize, admit and accept responsibility for what happened.  Explain the situation and be persuasive about the measures taken to avoid it in the future.

Announce the breach quickly and be ready for questions. Anticipate them and prepare honest answers or you will lose credibility.   This will show your company as a reliable and transparent partner. It is the only way to maintain trust in such difficult circumstances and to limit rumors which is the key for survival after a cyber threat.


Ransomware is one of the fastest-growing areas of cybercrime. Cyberextortion, ransomware and hacking hostage have become the easy moneymaking trend among hackers. They use malwares to lock and/or encrypt your data, and if you want it back, you have to pay up. It initially targeted PCs and is now evolving to mobile platforms.

Cyberextortion can take form in many schemes. Denial-of-Service (DoS) is when hackers create so much traffic on an organization’s website or online businesses that users are denied access. They would then demand money to stop the DoS.

One of the most common ‘Data Held Hostage’ schemes, is when cyberextortionist encrypt the victim’s data, preventing it’s use or access and demands a ransom in exchange for the decryption key.

Hackers may also steal intellectual property and threaten to sell it to competitors or alter DNS settings to redirect the corporate website and hold it hostage unless the victim pays to get it back.

Another form of Cyberextortion is to find weaknesses in corporate networks and threaten to notify the press, competitors or users unless compensation is paid.

A commissioned blind survey of 250 security professionals within U.S. mid-market enterprises by ThreatTrack Security, shows that 30% of the security professionals who responded said they would negotiate with the extortionists. And that percentage rose to 55% among organizations that have already fallen victim to cyberextortionists.

While large companies may be perceived as the number 1 targets for cyberextortion, small and mid-size enterprises are becoming more vulnerable. Hackers know that businesses simply can’t afford the loss of revenues if their site goes down and stays down for a period of time.

How would you deal with Cyberextortion? Pay it or fight it?

Proactive Risk Management is a leading multinational provider of risk management and security services. By taking a global and integrated approach to risk management and by recruiting the security industry’s top talent, PARM has been able to provide an unmatched level of service based on four interconnected pillars: business intelligence, incident management, loss prevention & security services, and technology / tradecraft innovations. Click here to learn more.

{ Comments on this entry are closed }

À la mémoire d’un Grand Homme – Jean Rosa (Joao Norberto Da Rosa)


Joao Norberto Da Rosa (1940-2014) Jean Rosa Cher papa. Tu nous as quittés mardi après une vie trépidante et remplie de défis. Oui, c’est trop rapide. La tristesse qui m’habite maintenant semble irréelle. Il faudra laisser le temps adoucir ma souffrance d’avoir perdu mon papa qui aimait tant partager et échanger sur tous les aspects […]

Read the full article →

Trois trucs de leadership


Il n’existe pas de recette magique pour avoir plus de leadership. C’est un apprentissage qui peut être long parfois. C’est surtout difficile parce que souvent, vous ne savez tout simplement pas par où commencer. Voici quelques trucs que vous pourrez implémenter dès demain, et qui vous mettront sur la bonne voie. Ce sont en fait […]

Read the full article →

Offres d’emploi: commis de bureau-réceptionniste et superviseur comptabilité


Communication 8020 est présentement à la recherche d’un commis de bureau-réceptionniste et d’un superviseur comptabilité. Vous êtes à la recherche de nouveaux défis? Nous aimerions vous rencontrer si vous êtes responsable, fiable, minutieux, sociable et plus encore! Envoyez votre curriculum vitae à:

Read the full article →

Operational Risk Management


Whatever the economical context or exploitation domain, certain businesses show continued performance and growth whereas others are stagnate or disappear.  According to you, why?  The key to their success is the risk management inherent to the operations.  To obtain commercial objectives and to present a constant evolution, these successful businesses are able to treat all […]

Read the full article →

Vous rêvez de voyager en travaillant?


Notre équipe est présentement à la recherche d’un adjoint exécutif pour projets spéciaux. Vous êtes peut-être le candidat idéal si vous parlez et écrivez l’espagnol et l’anglais, êtes organisé, rigoureux, habile à effectuer plusieurs tâches à la fois, dynamique, aimez prendre des responsabilités et êtes disponible à voyager… Vous l’êtes?

Read the full article →

La Gestion du Risque Opérationnel


Quelque soit le contexte économique ou le domaine d’exploitation, certaines entreprises affichent continuellement performance et croissance alors que d’autres stagnent ou disparaissent. Pourquoi selon vous? La clé de leur réussite réside dans la gestion du risque inhérent aux opérations. Pour atteindre leurs objectifs commerciaux et présenter une constante évolution, ces entreprises à succès sont aptes […]

Read the full article →

Responsable de gestion d’incidents, une carrière d’avenir!


Stratégie-8020 réalise des contrats d’externalisation en gestion d’incidents et service à la clientèle touchant la sphère de l’exploitation commerciale. Dans le cadre de ces activités, nous sommes à pourvoir un poste de responsable de gestion d’incidents. Si les défis vous stimulent et que l’excellence vous passionne, nous vous invitons à consulter l’offre d’emploi. Vous pouvez […]

Read the full article →