Data is more of a commodity than it has ever been, and more often than not, companies spend a considerable sum on data security. Unfortunately, even the most well-defended organizations still have trouble keeping data safe. 2018 saw 446.5 million records exposed due...
Would One of These Social Media Scams Bamboozle You?
Social media plays an increasing role in both the professional and personal sides of our lives. Unfortunately, this means that we all experience an increase in exposure to the many scam attempts that will appear on our screens. Like any scam, the best defence against...
USB Killer Caused $58,000 in Damage to The College of Saint Rose
For the modern business, a lot of time is spent focusing on network security. The theory behind this action is that there are all types of threats that could be trying to get into your computer network. At a college, you’d expect that, since so much sensitive data,...
Ransomware attack hits Stratford Ontario City Hall
The City of Stratford Ontario says it has been the target of an apparent cyber-attack, but officials do not believe personal information was compromised. The City of Stratford says it has been the target of an apparent cyber-attack, but officials do not believe...
Security Is a Big Component of Windows 10
With Microsoft betting on Windows 10 to be their #1 OS for the foreseeable future, it is essential for them to be able to sufficiently protect their users from the growing threats looking to make life difficult for businesses from all over the world. Today, we will...
Are the Messaging Apps You Use Secure?
Messaging applications are critical to the success of the modern business, but it’s essential that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are...
Understanding How a Password is Cracked
If you were to ask us what one of the most important cybersecurity features to have is, chances are, we’d answer “secure passwords.” Sure, this might be the answer that you’d hear from everyone, but that’s because it is really that important. For our tip, we’ll...
Social engineering: the go to method for hackers
Social engineering attacks are happening every day, and it is often the first technique hackers turn to, because "calling somebody on the phone is so much easier than doing the technical magic you need to break into a computer." Is your name and your phone...
Cybersecurity outlook for 2019
We all know data is valuable, but too often we act as if it isn’t. Valuables are often secured – kept in safes, insured, treated with care. With valuable business and personal data moving around the internet all the time, criminals are always looking for new ways to...
500 Million Users Exposed by Marriott
2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some...