Tag: Hacking

20
May

Top Phishing Email Scam Subject Keywords

  Written by: Jay H. Phishing is the top cybersecurity threat facing individuals and organizations alike. Last year, forty-three percent of data breaches involved phishing, demonstrating just how widespread the issue is. A recent report from Expel analyzes phishing emails and uncovers the most common tactics scammers use to trick victims successfully. After analyzing ten thousand malicious emails, Expel determined the top

Read more

14
May

How To Reduce Cyberattack Risk For Your Organization

Written by: Jay H. Every business is at significant risk of a cyberattack. Indeed, 42 percent of businesses experienced a cyberattack in the last year, yet many businesses still do not take action to defend themselves. Reducing your firm’s cyberattack risk should be one of your biggest priorities in order to prevent costly breaches. Here are some ways you can

Read more

9
May

How To Set Up Two-Factor Authentication (2FA) On Your Accounts

Written by: Jay H. Online security is more important now than ever. We are becoming more and more reliant on technology and the Internet for both our business and personal lives. Unfortunately, this dependence on technology gives hackers more reason to target our online accounts. One way to protect your online accounts is to enable two-factor authentication (2FA) to require

Read more

1
May

Nearly 30% Of Critical WordPress Plugin Vulnerabilities Unpatched

Written by: Jay H. Data breaches are an area of major concern nowadays. Cybercriminals constantly search for new vulnerabilities to exploit and data to steal. However, a shocking report from WordPress security provider PatchStack reveals that nearly 30 percent of flawed WordPress plugins never receive an update. Plugins increasingly vulnerable 2021 experienced a 150 percent increase in the number of

Read more

13
Apr

Hackers Still Exploiting Years-Old Vulnerabilities

Written by: Jay H. If it’s not broken, why fix it? That’s certainly the attitude of many hackers, who are successfully exploiting software vulnerabilities that are several years old and have security updates long available. These attackers then deploy ransomware on victim businesses ‘ networks, encrypting their data, and halting business operations. Researchers at Qualys analyzed the most common Critical Vulnerabilities

Read more

8
Apr

Ransomware: Under Half Of Companies That Pay Ransom Recover Data

Written by: Jay H. Ransomware is every organization’s worst nightmare. A new study from Telus unveils how ransomware is impacting Canadian businesses and how firms can protect themselves from this ever-evolving threat. The survey included 463 responses from key decision-makers in Canadian businesses. While the study encompassed all industry verticals, there was a particular focus on eight sectors: financial services,

Read more

2
Apr

How To Secure Your Mobile Phone

  Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your

Read more

28
Mar

Scammers Steal $80 Million Per Month Through Fake Giveaways, Surveys

Written by: Jay H. Scammers successfully steal $80 million per month through fake giveaways and surveys, a new report from Group-IB finds. Fraudsters targeting victims in over 90 countries worldwide, including Canada, the United States, Italy, and South Korea, impersonate popular brands to steal users’ personal and payment data. An estimated 10 million people are victims of a single scam

Read more

16
Mar

How To Secure Your WordPress Website

Written by: Jay H. Keeping your WordPress website safe should be a priority for any site owner. Without proper protections in place, your website is vulnerable to hackers, attacks, malware, malfunctions, and other issues. However, you may not know precisely how to improve your site’s security. In this post, we’ll go over some of the ways you can quickly secure

Read more

6
Feb

What Is The Principle Of Least Privilege (POLP)?

Written by: Jay H. The principle of least privilege (POLP) is the concept that you should only grant any user, program, or process the bare minimum privileges required to perform its tasks. So whether that user is the owner or a new hire, they only have the minimum permissions needed to do their jobs. This principle works by giving excessive rights

Read more