Typically, if there is an attempt to compromise a health organization, we would respond from the cyber centre.
We've done a few different things. The first is alerts. When we see anything that a health organization needs to take action on, we issue those alerts, and they're timely. It's either alerts or flashes, etc. Those are things that need to be acted on immediately. Unfortunately, what we've seen is that some of them aren't acted upon, leaving vulnerabilities open and essentially making it free to compromise organizations.
The second thing is that multiple times a week, we have a call with all of the health sectors around Canada to continue to provide advice on what they're seeing and what we're seeing in terms of targeting, so they can also share information back to us. It's very important that it be in two directions, and that when they see something suspicious, they report it to both us and to the RCMP, in the event of criminal matters, although we do share, and it's important that we continue to share.
The third thing is that we published a threat assessment specific to the health sector, a threat bulletin to tell them that they can expect to see increased state-sponsored targeting as states look to gain more information on, for example, vaccine production and research, and to warn them what it would look like and then to continue to try to build awareness, because at the end of the day, prevention is far cheaper than responding to any incident.