Tag: Cybersecurity

16
Sep

What Is A Botnet And How Does It Work?

Written by: Jay H. Botnets are an extensive network of PCs infected with malware controlled remotely by an attacker, known as the “bot-herder.” Think of a robot army under the control of its master. Each machine under the control of the bot-herder is known as a bot. From the attacker’s centralized position, they can easily command every computer in the

Read more

15
Sep

Update Your Apple Devices Right Now

Written by: Jay H. All Apple users need to update their devices immediately to patch a vulnerability discovered by Canadian researchers. A serious flaw discovered by researchers could allow technology firm NSO Group to exploit Apple devices using its Pegasus spyware, prompting Apple to issue an emergency security update for iPhones, Macs, and Apple Watches. You need to update your

Read more

12
Sep

5 Business Wi-Fi Mistakes That Could Be Costing You

Written by: Jay H. With so much on your plate as a small business owner, you may not put much thought into your business Wi-Fi. You just give your guests the Wi-Fi password, and you’re all set, right? Unfortunately not. Taking this approach could expose your business to security risks and impede the guest experience. Here are five business Wi-Fi

Read more

28
Aug

Phishing: Watch Out For Fake Unsubscribe Buttons

Written by: Jay H. Scammers are using fake unsubscribe emails to verify valid email accounts for use in future spam and phishing campaigns, according to BleepingComputer. You may have seen these in your inbox – emails with little to no context, simply asking if you wish to subscribe or unsubscribe. These emails do not describe what content you are subscribing

Read more

21
Aug

Report: 1-in-3 Employees Likely To Fall For Phishing Scams

Written by: Jay H. Phishing scams are incredibly lucrative for scammers, who manage to rob victims of billions each year. A new report from cybersecurity company KnowBe4 demonstrates just how effective these campaigns are, finding that one-in-three untrained users were likely to fall for phishing scams. Who’s taking the bait? KnowBe4 used what it calls a “phish-prone percentage” (PPP) to determine

Read more

9
Aug

Update Your Router’s Firmware Immediately

Written by: Jay H. On August 7, BleepingComputer published an article detailing an actively exploited bug affecting millions of routers from various vendors and ISPs. This bug lets hackers remotely bypass authentication and deploy Mirai botnet malicious payloads on your router. If your router is impacted, hackers could take over and wreak havoc on your network! Millions Of Routers At

Read more

2
Aug

Top Industries Targeted By Cyberattacks

Written by: Jay H. All organizations are at risk of cyberattacks, yet some industries are at greater risk. Cybercriminals set their sights on more vulnerable industries that either deal with highly sensitive data or lack the cybersecurity infrastructure of larger corporations. Today’s businesses cannot afford to remain complacent with their cybersecurity. After all, a single data breach costs organizations an

Read more

29
Jul

The Phishing Tactic Cybercriminals Are Using To Trick You

Written by: Jay H. Phishing campaigns are fraudulent attempts to gain sensitive information such as passwords, usernames, and credit card information from victims. These scam attempts are a lucrative business for cybercriminals and the most popular way to distribute malware. In fact, phishing attempts impacted 75 percent of organizations in 2020. Given this, businesses recognize the importance of security awareness training to

Read more

15
Jul

Getting Rid Of Your Old Computer? Erase Your Hard Drive First

Written by: Jay H. Are you getting rid of your old computer or laptop? Before you do, there’s something you must do first – erase your storage drive. The Importance Of Data Wiping Your computer has a lot of business and personal information on it. Your hard drive stores everything from customer information to your business’s financial records. Needless to

Read more

12
Jul

The Most Common Types Of Cyberattacks

  Written by: Jay H. A cyberattack is an attack on the information system of an organization or individual. Usually, cybercriminals leverage these attacks to exploit sensitive information or otherwise disrupt operations. Cyberattacks impact businesses every day. Indeed, cybercriminals attack every 39 seconds, underscoring how important good cybersecurity defence is for organizations. Here are the most common types of cyberattacks

Read more