Notices
The LSN is initiating a cyber security toolkit that will provide members with security awareness training, tips and tricks and monthly tidbits on key cybersecurity trends for the protection of information.
October Security Tidbit: Password Protection
- Password Protection is an access control that helps keep data safe from security threats.
- Password Protection ensures that data can only be accessed with the right credentials.
- Passwords are the first line of defence against unauthorized access.
Read Tidbit no 1
November Security Tidbit: Login Security
- Login Security is an access control that prevents unauthorized access to accounts and data. This is the top concern when working remotely.
- Login Security involves using various methods of multi-factor authentication (MFA) to verify the identities of users.
- Building off the last tidbit, Login Security involves more than just a strong password protection policy.
Read Tidbit no.2
December Security Tidbit: Phishing
- Phishing is an attack that attempts to steal sensitive information in order to utilize or sell the stolen information.
- Phishing occurs when attackers steal user data, including login credentials, credit card numbers, or bank information. This occurs when an attacker dupes a victim into opening an email, instant message or text message or by clicking a malicious link.
- Building off the last tidbit, Protection against Phishing involves being vigilant in responding to and opening links and emails.
Read Tidbit no.3
February Security Tidbit: Remote Working
- Remote workers are typically the first to face security threats.
- Threat actors use different methods to target remote workers including physical access to a device, phishing, social engineering, ransomware, eavesdropping and traffic manipulation.
- Building off the last tidbit, Protection against potential threats for remote working involved being vigilant in managing your device and data.
Read Tidbit no.4
October 2025 Security Tidbit: Backups
- Backups are pivotal to protecting the data stored both electronically and as paper copies. This ensures that in the event of an attack, you will not
lose complete access to your data. - Threat actors use different methods to target data including through malware, unauthorized access, ransomware and accidental disclosure.
- Building off the last tid-bit, protection against loss of data involves being vigilant in ensuring the data is safely stored and backed up.
Read Tidbit no.5
November 2025 Security Tidbit: AI-Enhanced Phishing
- AI has enhanced phishing emails. Phishing is when a cybercriminal uses an email to appear trustworthy and convinces you to hand over sensitive information. AI can speed up the process of writing emails, while making them more believable.
- Threat actors use different methods of AI to enhance phishing attacks including personalization, emails that are well-written and targeted.
- Building off the last tid-bit, protection against phishing involves being vigilant in understanding AI tactics with phishing emails.


