Written by: Jay H. Phishing is the top cybersecurity threat facing individuals and organizations alike. Last year, forty-three percent of data breaches involved phishing, demonstrating just how widespread the issue is. A recent report from Expel analyzes phishing emails and uncovers the most common tactics scammers use to trick victims successfully. After analyzing ten thousand malicious emails, Expel determined the top
Written by: Jay H. Every business is at significant risk of a cyberattack. Indeed, 42 percent of businesses experienced a cyberattack in the last year, yet many businesses still do not take action to defend themselves. Reducing your firm’s cyberattack risk should be one of your biggest priorities in order to prevent costly breaches. Here are some ways you can
Written by: Jay H. Online security is more important now than ever. We are becoming more and more reliant on technology and the Internet for both our business and personal lives. Unfortunately, this dependence on technology gives hackers more reason to target our online accounts. One way to protect your online accounts is to enable two-factor authentication (2FA) to require
Written by: Jay H. Data breaches are an area of major concern nowadays. Cybercriminals constantly search for new vulnerabilities to exploit and data to steal. However, a shocking report from WordPress security provider PatchStack reveals that nearly 30 percent of flawed WordPress plugins never receive an update. Plugins increasingly vulnerable 2021 experienced a 150 percent increase in the number of
Written by: Jay H. If it’s not broken, why fix it? That’s certainly the attitude of many hackers, who are successfully exploiting software vulnerabilities that are several years old and have security updates long available. These attackers then deploy ransomware on victim businesses ‘ networks, encrypting their data, and halting business operations. Researchers at Qualys analyzed the most common Critical Vulnerabilities
Written by: Jay H. Ransomware is every organization’s worst nightmare. A new study from Telus unveils how ransomware is impacting Canadian businesses and how firms can protect themselves from this ever-evolving threat. The survey included 463 responses from key decision-makers in Canadian businesses. While the study encompassed all industry verticals, there was a particular focus on eight sectors: financial services,
Written by: Jay H. Cybersecurity is a hot topic nowadays. Seemingly every day, there are new headlines of businesses and websites getting hacked. However, did you know your phone is also susceptible to hackers and malefactors? Luckily, you can take steps to improve your device’s security. Here is how to secure your mobile phone. Lock Your Device If your
Written by: Jay H. Scammers successfully steal $80 million per month through fake giveaways and surveys, a new report from Group-IB finds. Fraudsters targeting victims in over 90 countries worldwide, including Canada, the United States, Italy, and South Korea, impersonate popular brands to steal users’ personal and payment data. An estimated 10 million people are victims of a single scam
Written by: Jay H. Keeping your WordPress website safe should be a priority for any site owner. Without proper protections in place, your website is vulnerable to hackers, attacks, malware, malfunctions, and other issues. However, you may not know precisely how to improve your site’s security. In this post, we’ll go over some of the ways you can quickly secure
Written by: Jay H. The principle of least privilege (POLP) is the concept that you should only grant any user, program, or process the bare minimum privileges required to perform its tasks. So whether that user is the owner or a new hire, they only have the minimum permissions needed to do their jobs. This principle works by giving excessive rights