Tag: Hacking

12
Jul

The Most Common Types Of Cyberattacks

  Written by: Jay H. A cyberattack is an attack on the information system of an organization or individual. Usually, cybercriminals leverage these attacks to exploit sensitive information or otherwise disrupt operations. Cyberattacks impact businesses every day. Indeed, cybercriminals attack every 39 seconds, underscoring how important good cybersecurity defence is for organizations. Here are the most common types of cyberattacks

Read more

21
Jun

3 Ransomware Myths That Put Your Business At Risk

Written by: Jay H. If you’ve paid any attention to recent news, you’ve likely seen ransomware stories dominating major headlines. The Colonial Pipeline cyber attack is just one example of the devastation a cyberattack can cause. However, many small-medium business (SMB) owners still don’t consider themselves to be at risk despite the abundance of cyberattacks. Unfortunately, this couldn’t be further

Read more

18
Jun

4 Practices That Put Your Business At Risk Of Cloud Attacks

Written by: Jay H. According to the US Cybersecurity and Infrastructure Security Agency, weak cyber hygiene practices are responsible for a string of new successful cloud attacks. Despite having security measures such as multi-factor authentication (MFA), other bad practices allowed cybercriminals to conduct cloud attacks on organizations. The attackers used various methods, including phishing, brute force login attempts, and “pass-the-cookie”

Read more

8
Jun

How To Protect Your Remote Team From Cyber Threats

Written by: Jay H. The coronavirus pandemic brought rapid digital transformation and changed how we do business forever. Most organizations scrambled to transition their workforces to remote environments, seemingly overnight. Despite the chaotic transition, many employees and employers alike have grown fond of teleworking. Even after the pandemic (eventually) subsides, the verdict is clear – remote work is here to

Read more

30
May

Is Your Industry One Of These Now Being Targeted By Cybercriminals?

Written by: Jay H. One of the biggest cybersecurity mistakes organizations make is thinking they are “too small” to be targeted by hackers. Every business is at risk of data breaches, malware, ransomware, or other cybercriminal attackers. Yet, data shows that some industries are some susceptible than others. Mainly, industries such as healthcare, finance, and education have been prime targets

Read more

18
May

Cybercrimes Cost Americans Over $4.8 Billion In 2020: FBI Report

Written by: Jay H. According to a new report released by the FBI, cybercrimes cost Americans over $4.8 billion last year. In its annual Internet Crime Report, the organization announced that it received over 791,790 reports of suspected cybercrime. Alarmingly, this number is a 69% increase in total complaints from 2019. The top three crimes reported by victims were phishing scams (241,342),

Read more

14
May

FragAttacks: The Security Flaws Affecting All Wi-Fi Devices

Written by: Jay H. On May 12, 2021, security researchers disclosed a new collection of security vulnerabilities that affect all Wi-Fi devices. These vulnerabilities, called FragAttacks, appear to impact every Wi-Fi device ever created. Here’s what you need to know about FragAttacks. What Are FragAttacks? FragAttacks stand for fragmentation and aggregation attacks. They are a collection of security vulnerabilities affecting Wi-Fi

Read more

11
May

Canada Is At Risk Of Ransomware Attacks On Critical Infrastructure

Written by: Jay H. According to a Canadian security expert, the ransomware attack on a major U.S. gas pipeline should be a wake-up call for complacent Canadians. “My sense is we are seriously vulnerable, and this [attack] is a major canary in the coal mine,” Christian Leuprecht, a security and defence expert and Queen’s University professor, said in an interview days

Read more

20
Apr

Zero Trust: Never Trust, Always Verify

Written by: Jay H. Zero Trust is a security concept first coined in 2010 by John Kindervag of Forrester Research Inc. This concept centres around the idea that organizations should not trust anything inside or outside their network perimeter. Instead, they should require strict identity verification for every person and device attempting to access resources on the network. But why be

Read more

11
Apr

Have Your Passwords Been Stolen By Hackers?

Written by: Jay H. A user recently posted an astonishing 3.2 billion usernames and passwords on an online public forum. This breach is a compilation of other data breaches from sites such as Netflix, Linkedin, Bitcoin, and more. The good news is that this data is not new – in fact, some of the information dates back ten years. However,

Read more