Mobile devices have become a staple in contemporary life, with more business uses added regularly. Unfortunately, this makes them a more enticing target for cybercriminals to go after. To help you keep your phone secure, we’ve assembled a brief list of best practices...
Here’s a Malware Refresher
Security threats are commonplace in the business environment, as an organization that turns a profit is sure to hold valuable data that is of use to criminals. Some people have an easier time identifying threats than others, but with so many different types of threats...
Microsoft SQL Server 2008 and 2008 R2 Approaching End of Life
A decade-old version of Microsoft’s popular database software SQL Server 2008 and SQL Server 2008 R2 is losing support on July 9,2019. If your business hasn’t moved away from the software, you are looking at a few real pressing problems. Let’s take a look at the...
Prioritizing Network Security is a Must
Every business has their version of risk management. Nowadays, with all the technology organizations use for productivity, collaboration, and communications, managing risk can often be difficult. There are numerous threats that come from the Internet that could put a...
Unpatched Windows is Like Leaving Your Car Door Open in a Sketchy Parking Garage at Night with Wads of Cash in the Driver’s Seat
I recently read a statement from the National Security Agency (NSA) expressing concerns over the risks and vulnerabilities that come with running unpatched versions of older Windows operating systems. First, you know it’s serious if the NSA, an entity in the US who...
“Paying the Ransom” Isn’t a Ransomware Defense
Ransomware has become a favorite attack vector for hackers - after all, for them, it’s pretty much a no loss game. They either get paid, or they move on to their next target. Unfortunately, cyberattackers that dispatch ransomware often do get paid, and these payments...
NSA-Developed Malware Used in Third-Party Hack
Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry...
CBC: Mayor of latest Canadian town to be hit for online ‘ransom’ calls for national strategy
Canadian municipalities are "sitting ducks" for "cyber terrorists," says the mayor of Stratford, Ont. — the latest Canadian community to find itself targeted by an online ransom attack. Dan Mathieson said that if his fellow mayors across the country don't start...
Even Cities Aren’t Immune to Ransomware
Ransomware hasn’t let up. It is essential to understand that any organization, of any kind, is a potential target of a ransomware attack - and yes, this includes municipalities. In fact, since 2013, over 170 government systems at the national, provincial and municipal...
Protect Your Data Using These Three Methods
With so much on the line for businesses that deal with sensitive information, security needs to be considered a top priority. Unfortunately, one solution that works for every threat out there doesn’t exist. The right combination of enterprise-level security solutions...