| <p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p> | | <p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p> |
− | [https://www.ineteconomics.org/perspectives/blog/hijacked-and-paying-the-price-why-ransomware-gangs-should-be-designated-as-terrorists Hijacked and Paying the Price - Why Ransomware Gangs Should be Designated as Terrorists]</h3> | + | <h3 style="text-decoration:none;">[https://www.ineteconomics.org/perspectives/blog/hijacked-and-paying-the-price-why-ransomware-gangs-should-be-designated-as-terrorists Hijacked and Paying the Price - Why Ransomware Gangs Should be Designated as Terrorists]</h3> |
| <p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p> | | <p class="recco">Recommended by the Office of the CIO of Canada, Treasury Board of Canada Secretariat, a GC Data Community partner</p> |
− | [https://www.cigionline.org/publications/patching-our-digital-future-unsustainable-and-dangerous/ Patching Our Digital Future Is Unsustainable and Dangerous]</h3> | + | <h3 style="text-decoration:none;">[https://www.cigionline.org/publications/patching-our-digital-future-unsustainable-and-dangerous/ Patching Our Digital Future Is Unsustainable and Dangerous]</h3> |
| <p>(In English) In recent years, the world has witnessed an alarming number of high-profile cyber incidents, harmful information and communications technology (ICT) practices, and internationally wrongful acts through the misuse of ICTs. Over the last 30 years, a unique and strategic vulnerability has been brought to society — by allowing poorly coded or engineered, commercial-off-the-shelf products to permeate and power every aspect of our connected society. These products and services are prepackaged with exploitable weaknesses and have become the soft underbelly of government systems, critical infrastructures and services, as well as business and household operations. The resulting global cyber insecurity poses an increasing risk to public health, safety and prosperity. It is critical to become much more strategic about how new digital technologies are designed and deployed, and hold manufacturers of these technologies accountable for the digital security and safety of their products. The technology industry has fielded vulnerable products quickly — now, it is crucial to work together to reduce the risks created and heal our digital environment as fast as society can. This paper was first published as part of CIGI’s recent essay series, Governing Cyber Space during a Crisis in Trust.</p> | | <p>(In English) In recent years, the world has witnessed an alarming number of high-profile cyber incidents, harmful information and communications technology (ICT) practices, and internationally wrongful acts through the misuse of ICTs. Over the last 30 years, a unique and strategic vulnerability has been brought to society — by allowing poorly coded or engineered, commercial-off-the-shelf products to permeate and power every aspect of our connected society. These products and services are prepackaged with exploitable weaknesses and have become the soft underbelly of government systems, critical infrastructures and services, as well as business and household operations. The resulting global cyber insecurity poses an increasing risk to public health, safety and prosperity. It is critical to become much more strategic about how new digital technologies are designed and deployed, and hold manufacturers of these technologies accountable for the digital security and safety of their products. The technology industry has fielded vulnerable products quickly — now, it is crucial to work together to reduce the risks created and heal our digital environment as fast as society can. This paper was first published as part of CIGI’s recent essay series, Governing Cyber Space during a Crisis in Trust.</p> |