Written by: Jay H. Cybercrime continues to be a lucrative endeavor for criminals. The average cost of a data breach is only rising, according to IBM’s 17th-annual Cost of a Data Breach report. Of the breaches impacting 537 organizations across 17 countries and industries, the average total cost of a data breach was $4.24 million. This is the highest cost
Written by: Jay H. Scammers are increasing using pop-up messages with fake warnings of computer problems to scam remote employees, according to data gathered by Fortinet. Over one in four organizations detected these types of deceptive scare tactics, also known as “scareware”. How Tech Support Scams Work The scenarios typically play out like this: first, the user receives a fake pop-up
Written by: Jay H. A joint security advisory issued by the top cybersecurity agencies reveals the most targeted vulnerabilities by cybercriminals over the past two years. The USA’s Cybersecurity and Infrastructure Security Agency (CISA), the USA’s Federal Bureau of Investigation, the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC) also shared details on these security
Written by: Jay H. The coronavirus pandemic uprooted the workplace as we knew it. Seemingly overnight, organizations relocated entire workforces into remote environments. However, with vaccinations steadily rolling out, long-forgotten pre-pandemic activities are resuming, including attending concerts, dining in at restaurants, traveling and office work. However, a recent survey from Leger and the Association for Canadian Studies suggests that few Canadians
Written by: Jay H. Phishing campaigns are fraudulent attempts to gain sensitive information such as passwords, usernames, and credit card information from victims. These scam attempts are a lucrative business for cybercriminals and the most popular way to distribute malware. In fact, phishing attempts impacted 75 percent of organizations in 2020. Given this, businesses recognize the importance of security awareness training to
Written by: Jay H. One of the biggest cybersecurity mistakes organizations make is thinking they are “too small” to be targeted by hackers. Every business is at risk of data breaches, malware, ransomware, or other cybercriminal attackers. Yet, data shows that some industries are some susceptible than others. Mainly, industries such as healthcare, finance, and education have been prime targets
Written by: Jay H. Apple released iOS and iPadOS 14.5.1 to the public on April 26. This update is particularly exciting for Apple users due to several new features focused on user privacy and experience. New Privacy Features The most significant feature in the new update is App Tracking Transparency (ATT), which shows which apps are tracking you as you
Written by: Jay H. The coronavirus pandemic abruptly forced employees from the office into their homes. Unfortunately, this unprecedented transition left employees exposed to numerous cybersecurity risks. A recent survey conducted by software vendor Lynx Software examines these threats and how to mitigate them. In a survey of 1,000 working Americans, Lynx found that a cybersecurity attack has impacted 36%
Written by: Jay H. The rollout of coronavirus vaccines offers hope for many to resume normality soon. However, many people have questions regarding when, where, and how they will receive their first doses. Amongst the confusion, attackers have seized the opportunity to exploit the situation and launched waves of vaccine-related phishing scams. Vaccine-Related Domains Registered According to a recent blog post
Written by: Jay H. We’re approaching one year since the start of lockdowns that forced most of the workforce into a remote environment. Now, many organizations are looking to adopt remote working long-term even after the pandemic subsides. If you’re one of many full-time or part-time remote workers, you may want to make some improvements to your work area. Here