Do you know the phrase, “Locks only keep out the honest?” The idea is that even though you lock your doors, there is only a thin layer of glass and good intentions stopping a criminal from entering your home through a window. Read More
- Published: 02 Aug 2019
Mobile devices have become a staple in contemporary life, with more business uses added regularly. Unfortunately, this makes them a more enticing target for cybercriminals to go after. To help you keep your phone secure, we’ve assembled a brief list of best practices for you and the rest of your company to follow.
- Published: 29 Jul 2019
Security threats are commonplace in the business environment, as an organization that turns a profit is sure to hold valuable data that is of use to criminals. Some people have an easier time identifying threats than others, but with so many different types of threats out there, it’s no wonder that some have trouble handling
- Published: 28 Jun 2019
A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the software and what options businesses that haven’t moved on
- Published: 24 Jun 2019
Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a damper on productivity, create inefficiencies, or shut down production entirely. Regardless of how large or small
- Published: 21 Jun 2019
I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who depends on the collection and processing of information, is worried that your
- Published: 17 Jun 2019
Ransomware has become a favorite attack vector for hackers – after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments can sometimes come from a surprising source: cybersecurity firms.
- Published: 14 Jun 2019
Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium
- Published: 11 Jun 2019
Canadian municipalities are “sitting ducks” for “cyber terrorists,” says the mayor of Stratford, Ont. — the latest Canadian community to find itself targeted by an online ransom attack. Dan Mathieson said that if his fellow mayors across the country don’t start working together on the problem, more communities may be hit by online extortionists holding municipal
- Published: 07 Jun 2019
Ransomware hasn’t let up. It is essential to understand that any organization, of any kind, is a potential target of a ransomware attack – and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the national, provincial and municipal levels have been infected.