00 Days 00 Hours 00 Mins until CSAM ends!

October is Cyber Security Awareness Month!
Follow us each week for new content

Knowledge Library

The knowledge library is a collection of articles that introduces important cyber security topics.

Man sitting at a desk with a computer and a target on him

Sneak Peek:
The Anatomy of a Hack

During CSAM, we will explore how a well-organized cyber attack unfolds to create a widespread disruption of critical organizational services and how you and your organization can stay cyber safe. Each week, we will learn about a different topic in cyber security through our graphic novel, The Anatomy of the Hack, blog posts, videos and quizzes. Follow along weekly for new material!


Chapter 1: The Collector (Coming Soon)

Next week we will learn about phishing and other forms of social engineering. Hover over the graphic novel image for a sneak peek.


Cover of chapter 1 of the graphic novel Blurry page from chapter 1 graphic novel

Chapter 1: The Collector

In the first chapter of The Anatomy of a Hack, Cindy responds to an unusual email request from her director at work. In this week’s materials, we will learn about phishing and other forms of social engineering.


Cover of chapter 2 of the graphic novel Blurry page from chapter 2 graphic novel

Chapter 2: The In (Coming Soon)

Next week we will learn about the importance of strong passwords. Hover over the graphic novel image for a sneak peek.


Chapter 2: The In

In The Anatomy of a Hack the story continues with the threat actors attempting to avoid detection and exploit vulnerabilities on the Health Care Agency. In this week’s materials, we will learn about why strong passwords are important and how threat actors can take advantage of weak passwords.


Chapter 3: The Set Up (Coming Soon)

Next week we will learn about good cyber hygiene. Hover over the graphic novel image for a sneak peek.


Cover of chapter 3 of the graphic novel Blurry page from chapter 3 graphic novel

Chapter 3: The Set Up

In The Anatomy of the Hack, the threat actors begin to deploy malware packages throughout the network. The organizational IT and Security team attempts to thwart the attacks. In this week’s materials, we will learn about good cyber hygiene and what steps you can take to improve your digital habits.


Cover of chapter 4 of the graphic novel Blurry page from chapter 4 graphic novel

Chapter 4: The Long Game (Coming Soon)

Next week we will learn about how a hack comes together. Hover over the graphic novel image for a sneak peek.


Chapter 4: The Long Game

In The Anatomy of the Hack is the conclusion of our story. The activated ransomware disrupts organizational services and the threat actor begins exfiltrating data and demands a ransom payment. In this week’s materials, we will bring together what we have learned to explore how a cyber attack comes together.


Ransomware Evolved: New Forms of Attack

What is ransomware? How can you prevent a ransomware attack? Learn more about ransomware in this week’s article written in partnership with the Ontario Provincial Police (OPP).


Providing money to threat actor to reclaim information