Cornerstone Lifetime Wealth Advice

Why choose us?

Clients entrust us with the critical task of delivering the insightful advice and robust solutions required to achieve their financial goals. Leveraging our extensive experience working with individuals, families, and business owners, we provide personalized investment counsel and wealth management plans formulated to ensure positive outcomes. Whether you are in the phase of building your financial resources, drawing upon them for income, or considering the stewardship and legacy of your wealth management portfolio, we are equipped to provide comprehensive support.

Good afternoon. Thank you for joining us today. We're uh excited to host this

webinar uh where we have Cari Levy uh here to present with me on what uh we

both feel and I think many feel is a very uh timely and important webinar in

terms of content on cyber security fraud protection. Uh so Carney's going to jump

in here in just a few minutes and uh we have a good presentation for you. Should

run about 45 minutes or 50 minutes or so. I would encourage you to please uh

use the Q&A function uh that's part of the team service, the team's virtual

meeting service where you can pose your questions uh to me. I will relay them and we'll get those uh that feedback

from Carie. And uh we thank you again for pres uh joining us today. I just

want to emphasize that uh the the threats of cyber uh attacks and

financial fraud are are constant and the methods and the technology that are

being used by uh the people that look to uh to uh complete those cyber attacks

and financial fraud uh are are ever changing and frankly they're they're becoming more complex and uh more and

more difficult. ult to uh to prevent or or understand sort of what's what's real

and what's what's not. Uh so that's an important thing to keep in mind. I just

want to also just emphasize that uh this this is not a I can't guarantee that

this is a a presentation that's going to cover everything. uh but Carney and I

have collaborated on this presentation and we feel that it covers uh really the biggest part of the issues and uh not

just identifies them but gives some real good concrete uh steps that you can take

to uh as as you go as you leave this presentation. So again want to thank you

for joining us. I'm going to start the presentation here and I'll start by introducing Carie. Uh, so I I became f

familiar with Carme Levy from uh being such a big fan of News Talk1010 radio

and the morning show especially where I listen to John Moore the the radio host on the drivein to work in the morning

and car me is a regular contributor on tech Tuesdays with Carmy Levy and Carmy

comes on for uh for a discussion about technology related issues. So, Car is uh

a regular contributor on News Talk 1010 and uh dedicated much of his career to

understanding and forming about technology and he's a personal cyber security around personal cyber security

fraud protection is the is the uh discussion today. So, we're very fortunate to have Carie here with us and

I'm going to put the uh presentation up now and turn it over to uh to Cari.

Thanks so much for that introduction, Andrew, and thank you all for attending. I am uh I'm honored to be asked to be

part of this uh of this webinar. Um honored to be part of a conversation that quite frankly I think most of us

need to be having. Um and uh and you know, quite frankly, I think we're, you know, we're long overdue for a bit of a

reckoning when it comes to uh cyber security. uh you know my mission uh as Andrew uh alluded to in the intro uh is

you know really to break down the complexity of technology and make it simpler for us to use. Um I find the

technology by design uh is pro sometimes too complex for its own good and so it's

hard for us in the everyday to really unlock its potential. Uh and so you know

my you know working both you know with media I'm a journalist by by education and practice and so working with my

media partners um like John Moore at News Talk1010 and others across the Bell Media Network across the CBC um and

other major platforms in Canada. Um you know my mission really has been to kind of unlock that potential of technology

break it down in ways that you know even my mom would understand and if my mom understands then I I have absolutely

succeeded. And what I found out about technology as I've covered it over the

years is that cyber security related themes have increasingly dominated the

technology agenda. Um and so you know as as time goes on I kind of look at the

stories that I cover in the course of a given day uh or a given week and increasingly they they deal with uh

security breaches, ransomware attacks, fishing messages, things like that. And you know, just just this week, I'm sure

you all saw the headlines about uh the prime minister, Mark Carney, having his personal information uh compromised at

the at the Royal Bank of Canada by an employee, by an internal employee, uh closer to home. Uh Oxford County has

just suffered a major breach and uh that involved employee information. So through no fault of their own, they have

been exposed. So as time goes on, cyber security has become um you know an issue that whether we like it or not we all

have to deal with. Uh and so if we can just uh go to the next uh slide please. Uh we'll sort of start touching on sort

of what cyber security is and why we seem to you know why you know why we we

need to you know treat it with a little bit more uh let's call it you know care and diligence than we have in the past.

Um you know so I think you know if we can take a quick look at slide three our agenda items. Um you know I think the

first thing to that we really want to touch on is kind of understanding uh you know what a cyber attack is what it

looks like um especially in the context of the dayto-day. In other words what

does you know how do I even know that I'm under cyber I'm under uh threat? How

do I even know when I have been victimized? um what is the very definition of a cyber attack? Um you

know and and and once we kind of have an understanding of what it what it is and what the different categories of cyber

uh related events are uh we'll talk about some of the the the the tools the techniques the behaviors that we can

leverage uh to minimize our risk against these kinds of things. Uh and notice I

use the word minimize. Um you know the the the goal is to is to limit the risk.

Uh the unfortunate side effect of this is that there's no way to completely eliminate the risk. Um so it's really

about staying below the radar of of a cyber criminal um because we're all potentially victims. But if we do our

homework um we can limit the potential for that. Um we'll also take a look at

cyber, you know, I like to call it cyber insecurity. We'll talk about sort of what that looks like in the financial

space because obviously a lot of cyber uh related events, a lot of cyber crime

revolves around the finan financial space for obvious reasons. Um there's a reason why Mark Carney was targeted at

his bank. Um he is an individual of fairly high profile. His data is worth

something on the open market. And guess what? You don't have to be the prime minister of Canada for your information

to be worth it to someone. And so they're going after data, but they're also going after authentication

information. They want to get into our accounts. They want to trick us into sending money their way. There are all

sorts of different forms. And and and so and we're seeing, you know, those the dollar figures continue to increase

year-over-year um as cyber criminals become a lot more sophisticated in the ins and outs of uh of financial fraud.

Uh and at the same time, we'll talk about some of the things that you can do to tighten your protections against

them. Um and also some best practices that we can leverage um you know as we

are you know as as we're kind of going through the day-to-day um and uh you know to minimize you know as we're uh

dealing with for example our credit cards or we're we're managing our accounts online that there are ways uh

that we can minimize our our risk of falling victim and of being that next headline. Um so if we can go to next

slide please. Um, so the next slide, you know, let's

let's talk about the the the the types uh of cyber attacks uh that are out

there. And I think um I want to start just by sort of touching on on you know

sort of the the notion that cyber crime is something that happens to someone

else. Um and and the sad fact is that is not true. Cyber crime happens to

everyone. it happened to uh you know I if you're sitting among friends and you look to your left and you look to your

right chances are two of you either yourself and one of your friends or both of your friends um have already been

victimized in one way shape or form that is twothirds of all Canadians have been touched by this to date and that is a

percentage that goes up uh literally by the day as more victims are uncovered

and so we tend to think that cyber crime is something that touches those who are uh you know what I like to call rich and

famous. Um, but the sad reality is is each one of us is a potential victim as

well. That you don't have to be a high-profile victim in order to be worth targeting. Uh, you know, in the minds of

a cyber criminal. So, uh, this isn't something and and so again, if if you haven't been touched yet, chances are

someone you know has been and it's only a matter of time before it finds its way into your inner circle. Um, and it

often, you know, when we look at sort of the the the categorization of attacks, it often starts with a message. And so

the first sort of type of of cyber attack that you want to or the first what we call vector, the first sort of

way that cyber criminals reach out uh is what we call is what we call fishing. Um, and that is essentially a message.

It could be an email message in your inbox. It could be a text message um in your text inbox on your phone or any

other device that gets text messages. It could even be a direct message in social media if you use Facebook for example.

Facebook Messenger uh is is a you treated like an email service by a lot of people. I send and receive messages

on it because a lot of people reach out to me on that platform. Um and many of those messages come from accounts that

are not legitimate. And so, um, you know, we're all receiving countless

messages every day. And I would I would wager that if you kind of stopped right now and took a quick look at any one of

those accounts, there would be a fishing message, and that's fishing with a PH,

um, sitting in, you know, not only one of those accounts, but multiple of those accounts. Um, and it would be, uh, you

know, and and which isn't really, it's it's not a problem. the sky isn't falling if you don't interact with those

messages. And what a fishing message is is it's designed to get you. It's designed to convince you that it's

coming from a legitimate source. So, it could be uh your bank. It could be the

CRA. It could be somebody that you know, it could be pretending to be your grandchild uh or you know, a friend, a

long-lost friend. Um and it's designed, you know, here's that photo I promised

you. here's that budget I wanted you to look at. Could be pres pretending to be from a colleague. And in many cases,

those messages look frighteningly real. They have uh you know, they have the right logos and the right typography. It

looks like it's coming from your employer. Um you know, if you uh you know, it it has the the individual's

phone number and email address. Um and so it's just real enough that you're you're lulled into believing that it is

in fact a legitimate message. And in all cases uh or just about all cases, it

will ask you to either click on a link or download an attachment and that's the moment uh where you go from being you

know never having been attacked to becoming a victim of a cyber crime because the instant that you engage with

that payload with that link with that that attachment um as soon as you click

on that link that that's when bad things happen. And it's the fishing message that is the entry point, the gateway in

to this kind of uh you know this kind of attack. And so, you know, a lot of the

educational resources that we like to devote to understanding cyber attacks and protecting ourselves against cyber

attacks really focuses on how do we identify a message that that comes to us

in our inbox and how do we determine that it in fact is not a real message

that even though it looks like it's coming from my employer or from my bank branch manager um that it isn't real uh

and that I should not interact with it. Um and so you know once sort of we sort

of move beyond that message in our inbox um you know we you'll often hear a term

called malware and malware literally means bad software um and so what it

does depends on the nature of the particular type of attack. So, some attacks will be um you know,

significantly uh you know, some of them are are fairly benign, right? Uh it might run some software on your computer

that slows it down. It might steal some of your information in the background.

Um it might serve up ads. Sometimes that's called adwear. Uh or more insidiously, it could be uh a form of

spyware, which is software that lurks in the background quietly and it records

what it sees and it hears. It logs your keystrokes. It takes screen grabs without you looking. And of course, you

know, you're engaging in some pretty personal and confidential customized stuff on your computer. That information

in the hands of a cyber criminal uh can be used against you in all sorts of ways. And so, you know, malware doesn't

get there on its own. It usually ends up on your device if you engaged with a

message and clicked on that link. Same thing with ransomware. Ransomware is a

form of malware that has a very specific function. Um, instead of like lurking in

the background quietly, it makes its presence very known. If you click on on a link or if you download a piece of ma

of ransomware, what it will do is it will lock your computer and then it will

send a message to you uh and it'll say, you know, if you want your computer and your data unlocked, then send this

amount of currency. It literally holds your data, holds your system to at

ransom. Um, and it tells you that they'll they'll unlock it if you pay it off. Now, of course, there's all sorts

of guidance on why you don't pay ransoms when this happens. Again, story for

another day, but bottom line is ransomware happens when you get a fishing message and you unfortunately

click on it. Um, the final sort of major version of cyber attack is one that you

really can't do anything about. It's called distributed denial of service or DDoS.

And those are interesting. Those are almost like if you can imagine a pitchfork wielding mob um that is um you

know quite literally um you know marching down the street and they come up to your front door and they make a

lot of noise and they bang on the door and they terrorize the dog on the inside of the house but they don't actually

break in. They don't actually steal anything. they just disrupt your life

because you can't come and go as you please. Um you know it it essentially

freezes you in place and in the context of it being a website um a a a DDoS

attack what it will do is it will target a particular resource online. So it

could be a website, it could be your device, it could be a computer, it could be your phone company's network, it

could be, you know, something that is identifiable and it will literally hammer it with request after request

after request. And eventually there will be so much traffic there, so many pitchfork wielding mobsters standing out

on the front porch knocking on your door that the network eventually or the service the target eventually collapses.

So the you know the bad news is you you're out of commission. You can no longer use that technology. The good

news is unlike a ransomware attack uh your data isn't frozen in place. Unlike

other forms of malware, your data isn't stolen. Uh nothing is stolen. In fact, nobody breaks into anything. No one ever

makes it into that virtual house. But it is highly disruptive and in many cases

cyber criminals are using distributed denial of service attacks to gain attention to you know sort of cause a

really big outage. Uh and in fact there was a fairly significant one against the telecommunications networks in the US in

New York that was just discovered earlier this week. The US Secret Service discovered a plan to flood the cellular

phone networks with traffic with millions of texts and phone calls uh with the express intent of crashing it

while the UN General Assembly was in in uh in session. Thankfully, they caught it in time. it didn't happen. But it

illustrates just how sophisticated these attacks can be. Uh and how we sort of have to be on our, you know, on, you

know, keep our eyes open, heads on a swivel because you never know when, you know, you go to a bank and you want to

do your banking, the system may not be available. It might be under attack by criminals who are using DDoS. So if you

go to the next slide, please. So it just helps and and again there are

you know we can probably talk definitions on these uh you know for you know all day and all night. Um what you

probably want to do though is just kind of recognize that there are different kinds of threats out there and you kind of have to keep your eyes open for them

um just to make sure that you recognize them when they show up in your inbox um or you know or elsewhere. um you know so

you know definitions of malware I'll sort of I'll zero in on a couple of these and so Trojans and viruses just

the last two uh the last two paragraphs so um you know basically the if if you

think back and this is like way back to when I was a kid viruses were a thing the first real forms of cyber warfare

when you know the Apple computer was first a thing or when IBM first introduced its computers in the 80s

viruses were a really big deal and often times you would download a piece of software or you would get a disc from a

friend and it would have a virus on it which caused all sorts of behaviors that you probably didn't want. Um, and so

obviously nobody's exchanging discs anymore. Computers are a lot more sophisticated now, but um, they both

refer to and there's slight differences in terms of what they are, but the bottom line is is they're like a two

specific forms of malware and you never want to have to download them. And so this is, you know, this is another

reason why, you know, you don't want to be clicking on links from sources or hitting buttons or tapping on buttons

from sources that you're not familiar with because often time they will include downloads that in the background

install some form of malware on your computer. That's all you really need to know about it. It's the payload sort of

what it actually does will defer based on each type of uh of uh of attack or or

sort of the intent of the attacker. But you do want to make sure that you're kind of aware of those differences and

always lead with cynicism. If you're not sure of the source of a particular message, uh then the last thing you want

to do is be engaging with it. And a really interesting sort of, you know, a technique that I use is um I I if I'm

not sure about the origins of a piece of email or a message from someone, I don't

I I I I I put my smartphone or my tablet down, I go over to my computer that has

a mouse on it um and I I do what's called the hover test. So, you take your mouse, hover the mouse pointer over the

link or over the button in that message. Uh it also doesn't hurt to hover it over

the the uh the header, the information at the top of the email with the name of the person, the email address of the

person because they might claim to be from your bank or from a legitimate address, but when you hover over it, you

will see the the real address pop up. And that's when you can see that if it

if it looks like it comes from, I don't know, Russia, uh or it might come from some place that you're not familiar with. It certainly doesn't look like a

legitimate email, say from the CIC. That's usually a tell that it's a

problem. You can also see if you hover over the link, it will have some web address that is unrecognizable or a

download that you probably should not be accessing. So, use the hover method to keep yourself from getting into trouble.

But remember, hover the mouse over it. Don't actually click on it. So, if we can move to the next slide, please.

And we'll just take a real sort of quick look. um at ransomware. And again, just a reminder that um ransomware is it

takes on many different forms. And it doesn't just spontaneously activate on your computer. It requires you to um to

open up uh the message. It requires you to engage with the message by uh

clicking on it. Uh and then, you know, from that point on, it activates and does what it was designed to do. Um it's

sometimes called malicious software. It can encrypt your data. Um it can lock your computer. Um so you know the you

know the bottom line here is um I would rather risk being you know you know

embarrassed or feeling sheepish by contacting my bank and saying did you send me that message? Uh or you know

contacting Andrew and asking him if he sent that message uh then clicking on it and finding out the hard way that it

wasn't really from them. um you know so you know and and another you know when we look at uh sort of prevention

strategies um ransomware wouldn't be such a big deal if all of our data was already backed up and if you think about

it uh and this is important as you're you're managing your financial affairs you're you're managing your inbox you

know we're all responsible for an ever growing kind of collection of electronic

data to manage our day-to-day lives including our finances what we want to do is we want to make sure that if that

you know I I always think to myself, well, what if all of that wasn't available tomorrow? What if I were a victim of a ransomware attack? Would I

be able to restore myself to where I was? And there are some companies that

when they've been attacked and some individuals when they've been attacked with ransomware, they simply ignore it

because their data has already been backed up and they can easily start from scratch and just just use that information to reestablish themselves

online. So um do keep in mind that you know when you're working online you want

to make sure that all the data that you're working with your statements things like that they don't just exist in one place you know when your

financial advisor sends you information via email it's important that you download it you know put it in a place

that's secure make sure that if the worst if the worst happens your plan B

is I have everything that I need to restore my information. uh you need to have just like you have a physical plan

for your physical files in your home, you want to have a similar plan, plan B, backup, disaster recovery plan for your

electronic files as well. Um so if we can um hit next as well, we'll sort of

talk uh a little bit more about fishing. Um and Andrew, if you do have any questions, feel free to weigh in. Um,

I just want to point out fishing like a derivative or a subcategory of fishing

attacks that's become quite popular is the click fix attack, right? Which is you get a you it appears to come from

Microsoft saying there's a problem with your computer. It looks all very legitimate. It just pops up on your

screen. Click here uh to fix or to report it. And that's the same sort of

fishing attack uh ju but it just looks like a what they call a clickfix attack.

Exactly. And you know what I would do and you know to avoid that never respond to an unsolicited message from the

outside if you really want to make sure that your software is being you know properly updated and has all the latest

security fixes applied. You can go into the settings of your smartphone or your computer or your tablet and you can make

sure that that software updates are set to be automatically on so that it always

happens in the background. Companies like Microsoft don't magically send out messages like this saying click here to

update your software. There are all sorts of other ways that it can be done. Um and and in many cases those messages

they look frighteningly real. They might address you by name. They might have other you know pieces of information in

them um that suggest that oh this must really be for Microsoft because they know who I am. They know what computer

I'm using. Uh they know where I live. Uh but in many cases all they're simply doing is taking information that is

available out on the open internet. Sometimes it might have been uh you know released in a data breach and they're

pulling all that information together and they're using it to create very targeted fishing messages. Sometimes

they're called spear fishing messages which are highly customized, highly personalized fishing messages. Um which

of course makes it more likely that you would think that they're legitimate. Don't take the bait. Bail out of that

message. uh and then and then use your own methods to verify that you in fact are updating your software properly.

So now that we've you know we're all sort of you know we're we're kind of we're frightened um you know I I think

it's important that we focus on on you know the things that we can do in the everyday to reduce our risk. And so if

we can uh pop over to the the password protocols uh slide just a couple down.

Um, I want to talk about and if you remember nothing from today, I I want you to think about the one thing that

you can do that can improve your security posture and it revolves around

passwords. Um, and so the problem with passwords is uh in many cases and and

passwords are if you think about it, we're in 2025 now. The first passwords

uh were first introduced with really the first you know we won't call them popular but publicly available you know

sort of computers to uh universities military and research labs way back in the 40s and 50s. uh and passwords really

became a thing then because they were the the best option that we had for authentication onto a system to ensure

that only people who were using that system, you know, that they were the ones who were authorized to do so and

nobody else could get in. And if you think about how far technology has advanced in the last 70 or 80 years, yet

the password still is our primary method of authentication.

uh and I would very humbly argue that there is uh there's infinitely there are

infinitely better ways to you know keep the bad guys out and ensure that only we have access to our stuff but the

password persists and part of the problem is also and I hate I'm not laying blame here but we are also part

of the problem we want our passwords to be easy we want to you know if we're downloading an app and and or or

something or some data or we're signing into our email inbox we don't want to get locked out We don't want to waste

time. We don't want to have to recycle our password and go through that whole rig roll. We certainly don't want to

have to explain it to our family members if we're their tech support. Uh and so in many cases, we all we we we lean

toward convenience instead of security. And so many people, and I hear this from a lot of people, they use the same

password that they've been using for years. Uh it's an easy to guess password. It usually has something to do

with maybe a family member or a pet or the street where they grew up or their favorite teacher from from primary

school. Um, uh, they use that same password across different systems and

apps and services. So the same password that they use to sign into the bank is the same password that they use to sign

into email, which is the same password they use to sign into their smartphone. Uh, and so the problem with that

approach, even though it makes it easy to remember so you don't get locked out, it also makes life easy for cyber

criminals that if your password gets leaked in some way in, for example, a data breach, um, it makes it

ridiculously easy for them to do what's called credential stuffing, they then go, "Oh, so I know the I I I have the

authentication for the email account. Let me try the bank account as well. Let

let me see if they have an account with RBC. I'll sign into that because we kind of know what the structure is. Let me

also see if I can sign into, let's say, their CRA account. Let me try their Microsoft account. Let me try their

Google account. And before you know it, it isn't just one account that's been compromised. It's multiples because the

the the passwords were not unique. Um, another uh sort of you know problem that

we run into is in many cases we are sharing personal information on social media which is really good for

connecting with your friends but it also mean it's also being watched by cyber criminals. And when I say watched sure

they might be actually reading your feed but in many cases they're using uh technology they're using automation to

scrape what you post to your your your feed and then use that as a way of

trying to break into your account. So when you fill out that survey on social media about your, you know, what street

you grew up on and, you know, what year you were born and you're sort of, what you're doing is you're sharing all sorts

of personal information that can be used to make it ridiculously easy for a cyber

criminal to get into your account. Combine that with information that's released in a data breach and next thing

you know, you have a significant problem. So, you know, the answer is what I like to call smart password

protocol. Um, it is unique. So every system, every app, every website, every

account that you have online has a unique password. That way, if one password is liberated or released or

breached, at least they're not getting into all of your accounts. You make it hard to guess. So, you know, don't

include easy words, certainly not your birthday or your partner or your dog or your cat. Um, and then you regularly

change them. And this is important and I know it's a hassle um but you change them regularly because in many cases

when there is a breach that information gets shared online and when it's shared

online it gets picked up by other criminals. In some cases they just give it away for free. In other cases they

sell it uh and those criminals will then take that information and immediately start trying to log into your account.

So, if you're using the same account that it's the same password that you've used for decades and let's say 5 years

ago there was a breach, it's almost like leaving the front door of your home open for 5 years, almost inviting thieves in.

And so, if you change your password regularly, what that does is it locks the door on cyber criminals. Sure, maybe

your information was released in a breach, but now there's nothing they can do about it because you slammed the door

in their face. And if you look at uh the this grid, this grid is an interesting

one because last year there's some uh some research that shows from Hive Systems that showed just how long it

takes to break into an account based on the complexity of your password. And I

would argue very politely of course that the longer we these things go on, the easier it becomes for cyber criminals to

break into an account because the tools that they have are getting more powerful almost by the day. So it might have

taken say I don't know you know uh you know 10 hours last year to you know you

run through a bunch of iterations that might be reduced to three or four hours by this year. And so you my

recommendation for folks who are trying to balance security and convenience is to consider a password manager. And the

three that are kind of at the top of the list here one password dash line Nordpass they're really simple that you

you load up the app you can install it on your phone download it for free. They do have they have subscriptions for

them, but you can also use the free version and they're quite capable. And what you do is you add your username and

password for all the different things that you have to sign into. And then that single app manages the process. It

generates secure passwords, hard to guess passwords for all of these systems. It will change them at regular

intervals. Uh and all you need to do is remember that one sign in for this app. Um, one password is at the top of the

list for a whole bunch of reason reasons. I believe it's best of bre, but at the same time, it's also Canadian.

So, if we're going to have our elbows up, may as well support the Canadian solution. It routinely is at the top of all the best of lists. But Dashland is

another great great choice, as is NordPass. And these are all, you know, security companies with long histories.

Absolutely worth considering because it certainly uh it balances off. It it lets you have strong patterns that are

regularly changed, but it also doesn't leave you vulnerable to being locked out just because you forgot one. Um, so

Andrew, I was wondering if you had any questions while we flip to the next slide. Uh well, I think this this is a

very good uh grid here because it shows uh just how quick it is for, you know,

and and how quick it is for uh cyber criminals to to hack a a computer or

technology piece of equipment if your password is not complex or long enough

or both rather. and and it's I think it's still being reported quite often that many people use the word password

as their password or they use like 1 2 3 4 5 6 7 8 and and that's that. Uh so

it's really really important to uh to to look at this and say okay where on this

grid do I fall? uh because you can see if you just go to 10 numbers and use a

combination of uh numbers upper and lowerase and then some symbols you're

already at 33,000 years that it would take for the current technology uh to

likely break through that. So that's not too big of an ask I think to say let's

get some complexity uh to and and uniqueness to each of our passwords.

Yeah, that's really great great great great advice and and the reason being especially um don't think of it in terms

of some cyber criminal sitting at a keyboard manually hacking away. They are using automated tools often powered by

artificial intelligence that are allowing them to continually scale up their password breaking efforts. And so

they're getting better and better at this all the time. And if you use easy to guess passwords, you're essentially

making life easy for them. And and I mean that every year there's a there's world password. I believe it comes it

happens in the summer. Uh and every year they publish the list of top passwords and you're right Andrew they always it's

always you know the the the number one password is password all lowercase then 1 2 3 4 5 6 or 1 2 3 4. And what really

bothers me about this sort of annual tradition is that every year that list stays the same and every year we don't

seem to be getting the message. And so essentially what it means is that anyone who isn't following smart password

protocol is basically putting themselves at greater risk than than compared to someone who is taking a little bit of

time to tighten their passwords. And then you know looking beyond passwords. So again passwords have been around for

70 80 plus years and clearly the world has passed them by. Um you know if you

look at the front door of your house uh you'd rather have two locks instead of one. So, think of the password as that

first really lousy lock that you get when when you first move in. And then think of two-factor authentication as a

second more powerful lock on top of it. That way, if someone still manage some

if let's say your password is breached or compromised, the door is still locked, they still have to get through a

second form of verification. And two-factor authentication sometimes is called multiffactor authentication or

MFA. And that simply means more than two. Um, is, you know, it could be a

fingerprint, a biometric, it could be facial recognition. Apple has Face ID where you look at it and it lets you in

because it knows your face. It could be voice recognition. It could be a a a four or a six-digit PIN. Um, it could be

a code that's sent to you via text message or via an authentication app.

Um, and there are all sorts of different forms and and again the reason being is we should all have choice. But, um, the

bottom line here is is when you're given an opportunity to activate two-factor authentication, I highly recommend that

you do so. That way any weaknesses and passwords, you're still protected even if the passwords are compromised. And I

agree that yes, it makes life a little bit more uh, less convenient because you don't just open up the app and you're

magically signed in. you still have to maybe look at your phone or, you know, touch the fingerprint reader or type in

a PIN. But that little bit of inconvenience up front is a major uh uh

uh determinant in uh you determining whether you are targeted or not and

whether they're successful at it. So, I highly recommend going into the settings and in many cases they're not turned on

by default. They should be. I wish they were, but do go into the settings and activate them yourself. Um and another

uh form of of protection. If we can go to the next slide please. Um is is

software and and so once upon a time it was known as antivirus software. It it

it it did then and it still does carry you know the leading brands are Norton, McAfee, Bit Defender, Total AV. You

would install it on your computer and then later you'd install it on your phone or your tablet or whatever device

you were using and it would constantly monitor your device and make sure that you know let's say you did you know

somehow accidentally inadvertently download some uh you know malware out there. It would find it would flag it

and it would remove it and then that way you were kind of protected. It's almost like a vaccine for your device. Um and

there's still there's still you know a market for that. there's still a reason for having it. But if you look at sort

of the evolution of Norton, McAfee and Bits Defender, increasingly they're not just called antivirus solutions. They're

full-on security solutions. And so they might include other uh types of

capabilities. So they'll include the protecting against viruses and malware. Uh they'll provide real time monitoring.

So you'll get an alarm if it detects something really weird. Uh they have what are called firewalls. So, it'll

prevent uh connections that have no business connecting to you from trying to do so. Um, it'll have warnings about

fishing messages. So, if you if it sees a dangerous link, uh, you'll get a you'll get a popup. You'll get a warning

when you're browsing. Uh, it'll ensure that you're not visiting a website that is somewhat compromised. It'll, you

know, prevent you from clicking on the wrong things. Um, and so there are all sorts of tools that are incorporated

into them and they're really great to have. However, uh what I've noticed there's a psychological effect of having

security software on your device that many people who install it think that once they're once it's installed, they

are absolutely impervious to being uh compromised digitally. In other words,

that it protects them and now they can engage in behaviors that might be termed a little bit more risky. So, they will

open that email because they're, oh, well, the antivirus software is going to protect me. I will visit that website

that I've never visited before because I don't have to worry about it. I got the software. And so the trick here is to

recognize that this software is not 100%. It helps, but it certainly doesn't replace good behaviors and you still

have to be, you know, eyes wide open, heads on a 360° swivel to make sure that

you don't click on the wrong thing. And, you know, don't put too much trust in the software because the software

doesn't always get it right. So, it's a good thing. And I often talk in terms of toolkits. You know, you want to have a

toolkit with a bunch of different tools and techniques in it to keep you safe. No one tool is the the perfect or

complete answer. But in concert with all the others, it certainly doesn't help to have a toolkit filled with a bunch of

different techniques. And certainly security software is one of those techniques that's worth considering. And

just like password management apps, uh there are free versions of it that uh that you can have and you don't have to

be spending money in order to have this. Um Andrew, if you had any anything to add at this point before we head on to

uh software updates. uh just just I think like we'll we'll just briefly on this slide which is that you same as

with your automatic updates from Microsoft or Apple uh to keep your your

your internet security uh u m and uh pardon me and software

updated and uh you you you often will just the same thing have automatic updates download from your Norton uh

from from Norton to update your uh your internet security program.

Exactly. Because the, you know, often times new threats are always being discovered and the software that we use

is really complex. There's no way that it's it's it's perfect or secure, you know, all the time. And so they're

always discovering new new weaknesses and they're always releasing new updates to close off those vulnerabilities. So

the last thing you want is to have old software that hasn't been updated because that makes you an easier mark uh

as compared to folks who are always updating their software and closing the door on these newly emerging threats. So

um you know the the easiest way to do that is just go into your settings uh and just make sure that software updates

are all automatically on. that will ensure that both the operating system for your device as well as the apps on

the device are always receiving the latest updates and that you're never you know sort of vulnerable. It's one of the

reasons why, you know, you know, you don't want to have like a 20-year-old computer that hasn't been

updated in years because it is I I would virtually guarantee that, you know, a

computer that hasn't had an update in that long of a period of time is probably loaded with all sorts of

malware and viruses and it's just almost a it's asking to be attacked. So, um, do

be careful on that and if you're not sure how that works, um, you know, ask someone who does, just go into the settings, turn it on, and you will be

taken care of from that point going forward. So, now that we sort of taken a look at some of the the system type

risks that we face, let's let's sort of put them in the context of financial fraud because obviously we're engaging

in financial uh, activities on these devices. uh and cyber criminals know

that, you know, hey, if they I can zero in on them when they sign into their bank accounts or when they're making a credit card payment, that can be a

pretty good payday for me. So, um you know, it let's take a sort of a closer look at financial fraud and uh sort of

look at the different types, the different definitions of it. Um because obviously it takes many forms and

unfortunately the the victimology, the dollar figures continue to go up, uh as time goes on. Um, so you know, one of

the key sort of threats that we face in sort of the financial space is your data, identity theft. And so whenever

you hear of a data breach, really what cyber criminals are going are going after is your information. So it could

be as simple as your name and your phone number or your email address or or your physical address or it could be

financial information, what bank you're in, what authentication information do you have on it. It might seem innocuous,

but over time those pieces of information, they give cyber criminals a lot of ammunition to launch very

targeted attacks against you. And so, um, you know, you always think about you when you sign up for something, what

information am I giving up? Um, do I trust them? Do I trust that they will secure that information? What am I

getting back in return for that? Um, because often data is the fuel for this kind of thing. um credit card fraud.

We're obviously we're seeing that skyrocket because increasingly we're engaging in e-commerce and and you and using our credit card numbers online to

pay for this. Uh I I I can't tell you how often I see people sharing photos of their their messy desk with a credit

card sitting on top of it with the number in full view. um or they will share it online in a message on in say

Facebook messenger or you know in an on from an unsecured email which of course then can very easily be picked off if

you're not using appropriate password protocols. So um you know the the relative ease of paying via credit card

online uh makes it an absolute target for cyber criminals and that credit card number with the security card number and

the expiry date that information in the hands of the cyber criminal is absolute gold. um investment scams. I'll tell you

the story of my aunt and uncle uh who uh you know would were would business with someone they thought they knew, friend

of a friend uh with a really great return rate, but it turned out it was not a sanctioned uh transaction and they

ended up losing uh more money than I care to even imagine. And it was heartbreaking to see them go through that uh all because they didn't do their

due diligence. the digital signs were there. Um that you know the the the uh

the uh the uh reports that they were getting on the size of their account uh were not legitimate. They didn't tie

back to actual accounts. Uh that the links were from non-legitimate sources, but by the time they realized that it

was a scam, it was too late and they had no recourse. Um, you know, and you know, real estate title fraud. This is an

interesting one because again, um, you know, if your information is out there and you're it's not controlled, it can

be used by a third-party actor, by a malevolent actor, a cyber criminal, um, to essentially register your property as

theirs. Uh, and you can find that literally the the carpet pulled out from under your feet before you even realize

that you have a problem. Information is power. Uh, everyone's information is worth something. And if we aren't

securing it on our devices in our day-to-day practices, we could find ourselves in some s some very serious

trouble. Um Andrew, have I gotten sort of everything on that before we move on to monitoring? Uh yes. Uh yeah, I think you've covered

it here. Uh couple of questions that we'll get to here. Uh talking about the

grandchild in the hospital, the panicked phone call, and we are going to be speaking about that. Uh a question about

how to safely use chat GPT. A very good question. I don't know that we'll necessar we won't likely have time to

address that type of question in this uh in this uh session, but I know that

perhaps we can have a followup uh presentation on artificial intelligence. Uh Carmen would be a great uh a great

person to speak to that. Uh so I'll just flip to the next slide here.

Awesome. Yeah. Yeah. Uh, not to scare anybody here, but the the addition of AI

into sort of the technology space, uh, it it it raises the stakes. It makes the

threat landscape that much more threatening. Uh, and it gives powerful new tools to malevolent actors, to

criminals. So, it's certainly something we want to keep our eyes on. Um, so, you know, this is this should be a

no-brainer, but a lot of people overlook this all the time. they don't monitor their accounts as closely as they can.

And you know, you don't have to wait for, you know, you it's 2025. We no longer wait every month to get a

statement from our bank. We can check online anytime. Uh and what cyber criminals often do once they gained

access to an account is they will test their access. They will make very small transactions uh involving small dollar

amounts just to see if it works, just to see what they're able to do because most of us aren't paying close enough

attention and we don't notice that. Certainly, if they if it's a large dollar amount that moves our our balances uh significantly, that would

get our attention. But if they stay below the radar and we're not really focusing on it, uh they can get away

with a lot and then of course their last transaction will be the big one that hurts. Um so most accounts have alerts

built into them, but they're not turned on by default. Uh and so this is something that you want to go into the

settings and turn on. And if you're not sure, uh do what I did. I went to my bank, my bank branch, spoke to my

manager, and I said, "Walk me through it." And he happily did. Uh, and it's probably not a bad idea to do that, you

know, every once in a while because the apps are always changing, and your financial expert is there ready to kind

of walk you through it. um Equifax and TransUnion, those those are the two biggest credit bureaus. They have tools

um that are attached to your credit file and can be used uh to detect uh strange

or anomalous behavior on it uh and can protect your credit rating uh from

damage in the in the event that you are victimized. And so again, these are available to all of us. It's sort of

part of the credit rating system. Uh but uh you you're you know, they're not

turned on by default. we have to go in and reach out to them. Um there also there's title insurance uh that can

protect your property from you know this kind of incursion. Then there's also identity theft insurance um for which

for a lot of people is a rider on a traditional uh insurance uh uh policy. Uh and considering the potential for

damage in this digital age might be worth having a conversation with uh you

know about with your broker. Um because obviously recovering from this kind of thing, the damage isn't just financial.

Uh it is to your personal brand. It is to your credit rating. Uh it can affect you on a number of ways. And so digital

f you know digital friendly insurance of this type can certainly go a long way toward cutting down the risk if the

worst does happen. I can just a couple of things uh as well here. setting up account alerts on like

your bank account, your credit cards, uh, incredibly important. And these are

alerts that you're getting as either text messages or email notifications whenever a transaction occurs on those

accounts, a bank account, credit cards. Uh, I really I I really encourage everyone to do that to review those

accounts online on a regular basis. And I mean like every few days, every maybe

every day or weekly. Um and and then I think most most people now are aware

that of the data breaches at at a whole slew of different companies. Uh you

know, I had one our our car and uh our auto and home insurance provider. They

were uh they were hacked and now I've been with TransUnion and Equifax for a

couple of years for monitoring. So that's becoming a pretty regular occurrence unfortunately. And I think

many people now are getting these sort of two-year, three-year, free setups with those credit agencies. Uh, National

Bank offers a service called Secure Zone that that actually brings those two together into quite quite a nice

website. Uh, so that's an interesting service to consider. And, uh, identity

theft insurance. Um, I think if you if you think about if your if your identity is stolen, the time and the cost that

goes into repairing that, correcting that is extensive. And the title or

pardon me, the identity theft insurance can cover you for, you know, tens of thousands of dollars of cost. Not to

mention the fact that people that deal with this every day are the ones that will be looking after restoring your

identity. and they they know the ins and the outs, where to go, who to speak to, what to submit, all of these different

uh aspects of it. And uh that could be a real uh a real benefit to consider.

Yeah, definitely worth every penny. And certainly I've had a front row seat to uh some pretty heartbreaking cases uh

involving identity theft and financial attack and recovery from it is uh brutal

on a good day. uh and certainly having resources like this in your corner can go a long way toward uh facilitating

that recovery. Um you know one sort of area of risk that we often don't uh pay

attention to is uh just securing our data after the fact. So you know long ago you know you would see and you still

do see you know these these shredding trucks show up at businesses to to destroy sensitive documents. You should

have a similar plan for your own documentation. Um, you know, some nights I I I I have a Ring doorbell and the

footage when it's recycling night is actually quite frightening. Strangers walk up to my uh my recycling bins and

they go through them looking for papers with identifying information on them and they go down the street uh and many many

people are just putting information in there. So, use a shredder. Uh, you know, Andrew recommends a crosscut shredder

and uh and my wife swears by ours. Uh so uh you know it's it's easily the

probably the most cost-effective appliance that we have in the house because we use it for everything. And then you want to apply the same you want

to apply the same logic to your online information. You know how many times do you know do we just sort of save files

on hard drives or external drives or flash drives or even in in cloud accounts and then we kind of forget them

there. Uh and so you really do want to kind of have a sense of what am I storing? Where am I storing it?

increasingly if you're using say Microsoft Office they've moved all of that into the cloud and so if you're not securing your Microsoft Office 365

account um that information is now out there and it's vulnerable if there is an if there is ever an attack or or a

breach and so pay attention to your to to your your data make sure that it's secured make sure it's done so in a

comfortable way that still ensures that you don't lose at all if there is a a phys you know if let's say the drive

fails you still want to make sure you have backups but you don't want to lose control over it because in the hands to the stranger that can do do some very

serious damage. Um if we can move to the next slide and this is again most of us are you know

we're engaging in transactions all the time certainly during the pandemic uh we would go months without physically going

into a store. Everything that we bought was online. Um and so you know you want to use an acknowledged platform. So you

know built into your iPhone is Apple Wallet. Built into your Android phone Google Pay. PayPal is a payment platform

that's been around for a long time and is fairly secure as well. So, you want to make sure that you're using known uh

platforms with built-in security to keep things as safe as possible. Uh your

antenna should be going up if say you're buying or selling something on Facebook Marketplace and the person insists on

gift cards or some download some app that you've never heard of before. Be incredibly wary of deviating from the

tools that you know and trust. um you know online as well. Never buy anything

with a debit card. Uh reason being is credit cards have protection built in if a fraud does occur whereas debit cards

the money is taken right from your account and there is no recourse. So uh you know bottom line there is debit

cards are super convenient but not for online transactions. They're way too easily breached and soon to say that in

a in you know in a conversation uh you know criminals know that you're an easy mark. So please don't go there. I don't

I don't those are stories that absolutely break my heart. Um so you know again sort of if we can go to the

next slide um please just about unsolicited messages we have to disavow ourselves of the notion that uh you know

legitimate companies just will send us messages out of the blue for whatever reason that almost doesn't happen. And

so even if it looks like it's my bank or my financial adviser who are trying to get a hold of me uh I I will usually

view them with suspicion and then I will contact them directly. In other words, don't use the contact information in the

email or the message, but instead, you know, if I'm calling Andrew, I have Andrew's number. I will call him and

say, "I got, you know, it looks like I got an email from you. Is that in fact legit?" Uh, and Andrew will be able to

tell me, "No, we never sent you that message. Good thing you dodged a bullet." So, uh, you know, don't be

afraid to, uh, feel embarrassed if you don't respond to an email. You can be an

impolite Canadian. I give you permission to do so. Um and and you know my family we have um

we have code words um and so uh you know for example you know grandparent um

scans right grandparent gets a message uh their grandchild has been in an accident and needs money to you know get

the car uh you know pulled out of the ditch or uh committed a crime and needs money for bail. Um yet you know if you

know where you know my kids or we all have a password uh a code word uh and so if that ever happens uh then our kids

you know if I ask for the code word and they don't know it I know that it's false um in cases like that what you

want to do and thanks to AI um they can actually replicate they can voice clone your voice from a few seconds of footage

that they found online in a YouTube video and then it actually sounds like your grandkid but it isn't. Uh but it's

so real that you're emotionally uh upset and you make rash decisions and you start you start pulling money out

because you want your kid to be okay. So um bottom line here is is same deal. If you get one of those emergency calls,

you want to bail on it. You want to contact that that member of the family directly and ask them if they're okay.

If you don't hear that code word, you know full well this is an absolute ripoff. So again, the techniques are

becoming a lot more sophisticated over time. uh and cyber criminals are using artificial intelligence to you know

really put us in terrifying situations uh where you know we're possibly not making the best possible decisions. Uh

so if you can flip to the the next slide please we'll talk about sort of what you do if you are uh in fact compromised.

Um and what we've done in our house is we've actually itemized we have um like

documents uh that we keep on the fridge of you know uh our our bank our bank

branch manager um our financial advisor. So all the key contacts that we would

need to contact in the event of uh some kind of event. Uh we know who to call in

what order. Um we have contact information for law enforcement. Uh, and we also have contact information for

both Equifax and TransUnion for credit bureau. So, um, you know, it might seem a little weird to put that on on the

side of your fridge, but it certainly does help. We, you know, we have we have an action plan for, heaven forbid,

there's a fire or a flood in our neighborhood. Uh, we should have an action plan for a financial or a data

disaster as well. And having all that information on hand, pulling it out, um, it can save you a lot of hassle if in

fact you feel that you need to reach out when an event does occur. And then uh so next slide please. And

then longer term if you are in fact targeted you know the things that we can do again learn how a credit freeze

works. Learn how you would you would implement one if you needed to. Um understand what the options are for

identity theft protection. Know who you would contact within your particular financial institution. This is what

financial adviserss are there for. They answer those questions uh fairly and

impartially. And frankly, mine's an absolute superstar and Andrew clearly is as well. Um, so, you know, be lean on

them for that kind of guidance, too, because they're hearing these stories every day in their practice and they can

certainly share that with you and recognize that cyber crime is a constantly evolving thing. So, you know,

we have best practices in place today. Um, but over time obviously those best

practices will have to evolve as the criminals get better at what they do as

they use AI in ever more creative ways uh to pretend to be legitimate sources

to get inside that trust circle of ours. So, if we can uh pop over to slide 17,

we'll sort of just take a quick look at some of those best practices which we've touched on, you know, all all through

here, but this is probably a really good slide to print out and kind of put in a prominent place just so that you kind of

have a sense of these are the, you know, the top 10 things that you want to be doing to make sure that you're minimizing your risk as much as you

possibly can. Um so uh Andrew so just if we can um

switch to the next slide just kind of the conclusion just to kind of re revisit our agenda sort of make sure

that you know we covered what we felt we wanted to we wanted to understand what a

cyber attack was uh and recognize that it's happening to us even if we think it

isn't. Uh, in fact, our inboxes probably already have examples of it right now,

and we protect ourselves by being able to identify them and stopping them cold. Recognizing that increasingly cyber

cyber fraud uh, and cyber attacks are taking on a financial uh, component

simply because we're doing all we're living our financial lives online. Cyber criminals recognize that they're taking

advantage of weaknesses in the technology and our behaviors to, you know, go after those vulnerabilities.

Cyber criminals are not these, you know, brilliant masterminds that you see in the movies. They're looking for the

easiest mark. So, if you make life a little bit hard for them, uh they will in fact look to the next one. It's like

all those houses on the street, the house with the alarm system and a couple of locks on the front door and, you

know, maybe secured windows and some cameras on the outside, they're going to avoid that house and they're going to go after the house with the easily breached

front door and nothing else on it. So, uh, you don't have to be the the fastest, you know, person in the

neighborhood. You just have to be a little bit faster than the slowest and that'll keep you protected. They go after the easiest mark. Um, and then,

you know, recognizing that a lot of the stuff is a little bit annoying, you know, because, you know, you've got to invest time and energy and sometimes a

little bit of money um to, you know, put these protective measures in place. But when you compare the upfront versus what

it would cost you to recover from a cyber attack, recognize that it is a lot easier. you know, it's it's insurance.

You can pay me now, you can pay me later. Uh the upfront investment is a lot smaller than what happens if a

disaster actually befalls you. So, take the time. It's absolutely worth it. Uh and then, you know, making sure that you

have a disaster recovery plan for things like fires and floods. You want to apply the same kind of logic and the same kind

of, you know, planning rigor or methodology to cyber attack awareness,

cyber crime awareness as well. And if you have those conversations with the members of your of your family, you

stand a much lower chance of being victimized. No matter what kind of attack attack it or form it takes on, no

matter what kind of what kind of what we like to call attack vectors the cyber criminals are using against us because

they are a wy group. They're constantly changing their approach. But if we've got our eyes wide open and we're having

conversations with the people who matter most, we stand a reasonably good chance of sending them off and letting someone

else be the victim instead of us. So that's uh I I I unless I've I've I've

missed something. I think that again, you know, this is introduction to cyber crime. It's it's it's you giving you a

sense of what that awareness is. Keep in mind this starts a conversation. So this is probably a really good conversation.

You can continue with Andrew. You can certainly seek me out. Uh my my contact information is available online if you

have further questions. I always welcome u questions from you. I always do my best to respond to them. This is the

kind of dialogue that keeps me going and quite frankly informs the kind of coverage that I provide going forward.

So absolutely do not be shy and please know how thankful I am uh to all of you

and especially for an to Andrew for the invitation but also to all of you for taking the time uh to be part of this

conversation and hopefully the way I see it. This is an ongoing conversation and I'm already looking forward to the next

chapter. Thanks very much. That was excellent car. Thank you so much. Uh honestly, I think there's uh

there's just so much uh information to uh to consider when we think about uh

when we think about cyber crime, cyber attacks, financial fraud. Uh there's you

kind of have to think about what are the different um avenues that a criminal could take to attack me and my family

and what what steps do I need to take to uh protect against that? and if the worst occurs, how do I address it? And

Carmy's given us a lot of great information there. And I think there's a

lot to to sort of take away from this whole presentation. And not just only on

the uh on the technology side, uh but also on sort of the the the you know

insurance side. Uh, I think that that uh unique password or phrase uh with family

members and friends perhaps that's something that's kind of new to me at least where it's really becoming

necessary because as we touched on the the grandparent scam uh is is coming

becoming more common and actually there was a story not too long ago of a lawyer

a very successful accomplished lawyer around I think he was in uh mid60s or so

and he gets a call from his son or what he thought was his son uh and and he was

testifying before Congress actually to this effect. He was get he got a call from what he thought was his son saying

he was in trouble. I think it was a case where he was in jail. He needed money for bail and then there was an

intermediary who was getting involved to to you know move money to quote unquote

the bail bondsmen. And anyhow, the the the father was ready, just about ready to hit the the send button on a lot of

money going to this this criminal organization. And then the son calls and says, "Dad, it's me. I'm fine. You're

being scammed." And you know, so it's so it's so um uh sophisticated that so many

people can fall prey to it. And I think having that password or phrase established, that challenge password,

that challenge phrase established can can avoid a lot of that risk. So perhaps

consider doing that along with all of the other suggestions that Carmy uh has shared with us especially around alerts

uh on your on your bank accounts, your credit cards, especially around uh getting set up for credit monitoring uh

considering the title insurance, considering the insurance for identity theft because if that happens uh that

can become a real savior and uh so a lot of good information. Car me, I want to thank you again for uh coming on today

and sharing all of this wonderful insight with us. You're a tremendous presenter, a tremendous speaker, and I

want to thank everyone here uh attending uh very much for sharing this time with us. And if there are any follow-up

questions, please don't hesitate to send me an email. And uh if I can answer it, I will. Of course, if it's better for

Cari, I'll share it with him. And uh we want to just uh keep everyone informed and safe uh as best we can.

Thanks again, Carmy. And uh I'm going to end the presentation here. I want to thank everyone again. Have a great

evening.

 

Chat Replay

The Cornerstone experience

Whether you are a new client, or one that has worked with our team of advisors for years, we want each experience to leave you feeling confident about trusting us with your long-term wealth management needs.

Through regular contact, update discussions and review meetings, you'll be kept up-to-date on the progress of achieving your goals and how to deal with obstacles that may occur along the way. 

The whole is greater than the sum of its parts 

Our investment philosophy focuses on proven, long-term, diversified portfolios – like a forest needing upkeep. We constantly monitor and rebalance to align with your goals and risk comfort for sustained positive results.

Fees do not tell the whole story


Fees are important, very important.  We all want to ensure we're receiving value for what we pay.  Our fees and costs are always transparent and reported to you at the time of a transaction and summarized annually. 

We're constantly working on enhancing and improving our service to clients to ensure the fees you pay are justified and reasonable.

Have a plan and follow it

An investment and wealth management plan provides a clear roadmap to achieving your goals. We offer guidance as plans evolve. Avoid emotional reactions to market changes. Stay focused and confident with an updated plan.

Have questions? Contact us 

Let's talk about your financial dreams. We're eager to answer your questions and partner with you to build the future you envision.

JD Power and BNC logo.

Ranked #1, 2 years in a row

For Advised Investor Satisfaction according to the J.D. Power 2025 Canada Investor Satisfaction Study.

Keep up to date with what's trending this month.

Read the latest financial news from our National Bank experts. 

Consult our useful guides and tools to help simplify your finances. 

  1. Financial Planners are authorized to act in the field of Financial Planning. They exercise their duties for National Bank Financial Inc., a financial planning firm.

  2. We work closely with the Taxation, Retirement and Estate Planning Team from National Bank Trust, made up of multidisciplinary experts who provide knowledge and advice that complement our service offering. These experts assist us in providing the best solutions for your personal finances related to taxation, retirement and estate planning.

  3. Insurance products and services are provided by National Bank Insurance Firm (NBIF) or by NBF Financial Services (NBFFS), as applicable. NBIF and NBFFS are not members of Canadian Investor Protection Fund (CIPF). Insurance products are not protected by CIPF.

  4. Financing solutions are subject to credit approval by National bank.

  5. For details and conditions of the offer, please contact your advisor.

Contact us

Get contact information for our team members and find out where our offices are.  We look forward to speaking with you. 

 

Phone picto

1 888 778 3956

Extensions 

Andrew Mowat   92847

Kelly Vukojevic   92848