Technology is constantly evolving and becoming more intelligent. Facial recognition is one feature that has widely become normalized all around the world.
On average, 2,244 cyberattacks happen daily around the world. To put that in a different perspective, that's a new cyberattack every 39 seconds.
How much trust do you have in your employees? On average, around 59% of employees will steal company data after they leave a company.
Do you think your systems may have been compromised? Or maybe you realized you just suffered a breach? What should you do now?
How can you tell if your mobile device has been compromised? We're going to share some common signs that your device could be breached so you can be aware of potential security risks.
What is the downside to mobile banking apps? With more people using these apps to access their sensitive financial information and credentials, cybercriminals have an incentive to find ways to infiltrate and exploit you and your systems.
Although the COVID-19 pandemic hugely affected the use of communal workspaces in 2020, we're starting to see people return to them as they often assist with productivity.
Almost all cyberattacks are made possible through human error, and that's why it's extremely important to educate not only yourself, but also your employees.
Want to avoid a major home network breach? Here's a simple action you can do to reduce your risk significantly.
Cryptocurrency is not as straightforward as most people assume it is. Here's a breakdown of crypto-wallets so you know exactly what you're getting into.
Social Media platforms are a great way for individuals to connect with others, however, if you're not careful, you could be putting your safety at risk.
Ever wonder how much cybercriminals are paying to gain access to your stolen data? Spoiler... it's not a lot.
Cybercriminals have been calling phone network providers pretending that they are you and asking for access to your account. Here's how you can stop it.
It's very common to receive emails with malicious intent, but it isn't always easy to detect them when they come. One wrong click and all of your sensitive data could be compromised.
An ethical hacker or a "friendly hacker" is someone who has extensive knowledge around cybersecurity systems and uses penetrative testing to invade any vulnerable areas of a company's attack surface to see how effective their defences are.
As a chartered professional accountant (CPA), you hold a great deal of important and private information that may need to be held for years on end. Cybercriminals know this and will target CPA's accordingly.
DNA test kits are easily accessible and affordable, however, studies show that the information shared with users are not always accurate and could lead to misinformation. Alongside this, it is a major privacy issue.
Every time you take a photo using your smartphone, a ton of metadata is collected such as the time and location the picture was taken, and much more.
With more people online shopping, cybercriminals are taking this opportunity to take advantage of online shoppers and to potentially trick them into giving away personal information and funds through malicious activities. The major area we're seeing this take place on is through phishing emails.
Have you been getting odd messages on Facebook from friends or family saying "I think you're in this video" and then attached to that message is a strange link?
Spoofing is the term used to describe a situation when a cybercriminal impersonates a device or user on a network to trick an individual into sharing private information.
Ransomware is on the rise especially with more individuals and businesses moving online. In 2020, we saw huge increases in online activity due to the COVID-19 pandemic, and heading into 2021 and future years, we should expect those numbers to soar even higher.
When a business, organization, or individual experiences a hardware or software vulnerability that has been exploited by a cybercriminal, we call this a zero-day attack.
Many of us use the incognito feature on our browsers for different reasons, but do we really know what the incognito browser hides?
Have you ever come across a suspicious looking email but the website linked to it appears legit or you may have actually used it in the past and it was safe?
If you use Amazon, Facebook, Paypal, Uber, etc., you have probably encountered 2-factor authentication (2FA) messages to your phone usually with a code.While this intention for an added layer of security is a move in the right direction, SMS messages are not the secure route you'll want to receive security codes on.
We are all very accustomed to clicking links and downloading files from our email, and this makes it easy for cybercriminals to find access points to our inboxes.
You may have heard about the recent SolarWinds breach that affected companies like FireEye, Microsoft, the U.S. Treasury, and many more. The Texas-based software company stated that over 18,000 of their clients were breached in some way, however, some more severely than others.
Adware is dangerous because it is automatically displayed or downloaded onto your device when you are online, sometimes without you knowing. The type of software used creates advertising material displayed through online or through an app which ultimately generates revenue for the developer if it's shown or clicked on.
These days, many companies allow their employees to work on their phones. The danger surrounding this is the fact that corporate data is now accessible through mobile devices which typically don't have strong security measures put in place.
A 'deepfake' is a media clip that someone has edited, altered, and manipulated where a person in an existing image or video is replaced with someone else's likeness.
Cybersecurity is not a one-time thing, it’s evolving every day and it’s crucial for you and your employees to keep up to date on emerging threats.
Every time you type in a password to access an account, you’re using one-factor authentication. These days, you’ll need to layer your security better with the help of two-factor or multi-factor authentication.
If you're getting strange phone calls from numbers that seem local or even have similar digits to your phone number, you are experiencing a type of phone scam called 'Neighbour Spoofing.'
With more and more businesses opening back up and hiring new individuals, cybercriminals have taken this opportunity to lure individuals with fake job listings to gain access to your personal information.
Be aware of what you share on social media as it might give away valuable information to hackers and lead to a breach in your data.
Working from home these days? You need to know about these 3 things in your home office that can lead to a breach.
Local backups are fast, efficient and can be easily accessed whenever required. However, local backups are vulnerable to ransomware, which can potentially spread across your network.
Email scams are not the only form of phishing, are you familiar with the terms “Vishing” and “SmiShing”?
Cybercrime is ever rampant these days and many individuals feel that cybersecurity is not necessary. Meanwhile, every 39 seconds a new cyberattack happens.
Most of us don’t think twice about scanning a new QR code, but just like clicking an unknown link, QR codes can carry suspicious activity or malware that can infiltrate your device.
Most of us know what phishing is. But are you familiar with the terms “spear-phishing” and “whaling”?
We all know how important it is to have a strong and unique password for different devices and apps, but how do we manage all of them?
Credit card fraud has increased by 71% over the past decade with financial losses averaging around $800 million in 2019 alone.
With more shoppers browsing and making transactions online, we will most definitely see an increase in online scams and phishing attacks.
The popular video-sharing social media platform TikTok has become increasingly more popular especially amongst the younger generation. While the app is used to create funny and informative short videos mostly for enjoyment purposes, it tends to collect a lot more data on its users than other apps.
Do you use SMS messaging to share corporate data or private information? You might want to find a more secure messaging platform that has end-to-end encryption.
Phishing emails are becoming more common and more sophisticated. You might have some phishing emails in your inbox right now and you may not be able to tell.
It all starts with your home wireless network. These days, it isn’t just connected to our computers and phones, but things such as Google Home devices, video game consoles, printers, security cameras, smart watches, and even your lights.
As kids around the world slowly ease back into school, education systems find themselves dealing with new challenges, especially in relation to online learning.
The Dark Web is essentially the world wide web that exists on darknets. This ‘underground’ web is often where illegal activity takes place such as illegal trade, media, forums, terrorism, child pornography etc.