20
May

Top Phishing Email Scam Subject Keywords

  Written by: Jay H. Phishing is the top cybersecurity threat facing individuals and organizations alike. Last year, forty-three percent of data breaches involved phishing, demonstrating just how widespread the issue is. A recent report from Expel analyzes phishing emails and uncovers the most common tactics scammers use to trick victims successfully. After analyzing ten thousand malicious emails, Expel determined the top

Read more

14
May

How To Reduce Cyberattack Risk For Your Organization

Written by: Jay H. Every business is at significant risk of a cyberattack. Indeed, 42 percent of businesses experienced a cyberattack in the last year, yet many businesses still do not take action to defend themselves. Reducing your firm’s cyberattack risk should be one of your biggest priorities in order to prevent costly breaches. Here are some ways you can

Read more

9
May

How To Set Up Two-Factor Authentication (2FA) On Your Accounts

Written by: Jay H. Online security is more important now than ever. We are becoming more and more reliant on technology and the Internet for both our business and personal lives. Unfortunately, this dependence on technology gives hackers more reason to target our online accounts. One way to protect your online accounts is to enable two-factor authentication (2FA) to require

Read more

1
May

Nearly 30% Of Critical WordPress Plugin Vulnerabilities Unpatched

Written by: Jay H. Data breaches are an area of major concern nowadays. Cybercriminals constantly search for new vulnerabilities to exploit and data to steal. However, a shocking report from WordPress security provider PatchStack reveals that nearly 30 percent of flawed WordPress plugins never receive an update. Plugins increasingly vulnerable 2021 experienced a 150 percent increase in the number of

Read more

24
Apr

4 Ways To Improve Your Company’s Mobile Device Security

Written by: Jay H. Mobile devices are a major aspect of our work and personal lives. We access a plethora of sensitive information on our devices, including emails, stored passwords, and company data. However, your company’s mobile devices can pose a risk to your organization without implementing security measures. Let’s go over how to improve your company’s mobile device security.

Read more

19
Apr

Ransomware Victims Hit Multiple Times

Written by: Jay H. Ransomware has dominated headlines in the past couple of years, and 2021 was no exception. Unfortunately, ransomware is only growing as a threat – and successful attacks are costing organizations even more. Many businesses that fall victim to ransomware end up paying the costly ransom in hopes of retrieving their data. However, many end up paying

Read more

16
Apr

6 Essentials For Your Work From Home Setup

Written by: Jay H. Working from home is something many of us have had the opportunity to do over these past couple of years. Indeed, many employees are working from home indefinitely. If you’re among those working remotely part-time or full-time, you can improve your productivity and comfort by investing in a proper setup. Here are 6 essentials for your

Read more

13
Apr

Hackers Still Exploiting Years-Old Vulnerabilities

Written by: Jay H. If it’s not broken, why fix it? That’s certainly the attitude of many hackers, who are successfully exploiting software vulnerabilities that are several years old and have security updates long available. These attackers then deploy ransomware on victim businesses ‘ networks, encrypting their data, and halting business operations. Researchers at Qualys analyzed the most common Critical Vulnerabilities

Read more

8
Apr

Ransomware: Under Half Of Companies That Pay Ransom Recover Data

Written by: Jay H. Ransomware is every organization’s worst nightmare. A new study from Telus unveils how ransomware is impacting Canadian businesses and how firms can protect themselves from this ever-evolving threat. The survey included 463 responses from key decision-makers in Canadian businesses. While the study encompassed all industry verticals, there was a particular focus on eight sectors: financial services,

Read more

2
Apr

How To Secure Your Mobile Phone

  Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your

Read more