There are several ways your data and privacy can be breached and one of them is SIM Hijacking. SIM hijacking occurs when a hacker persuades your cell phone carrier to switch your phone number to their device instead of yours. Once done, any calls or texts will be routed to the hacker's mobile rather than your own. Click to Read more.
Ever wondered how cryptocurrency became so popular. Did you know that someone once sent 10,000 bitcoins to a pizza deliverer? This blog will talk about the history of cryptocurrency as well as how to secure your crypto-wallet.
It's more important than ever to be aware of basic cybersecurity procedures. By being aware of common scams, consumers can take steps to protect themselves and their data. Multi-Factor Authentication (MFA) is a great tool to help protect our data from cyber attacks. Read more about multi-factor authentication and its uses.
As technology advances and more users have started to transition their workforce into the digital space, an increase of malicious attacks and malware rose to an all time high. In order to combat these attacks, we need to understand the difference between Next-Generation Antivirus and traditional antivirus solutions.
A zero-day attack is an unknown exploit that introduces a software or hardware vulnerability and can cause serious problems long before anyone notices anything is happening. In fact, a zero-day attacks has little chance of being discovered.
Trojans are a common form of malware that is employed by cyber hackers to gain access to users’ systems. Keep reading to learn more about how Trojans work and how you can keep yourself safe from this form of malware.
VPN are commonly recommended by cybersecurity experts as a safe way for you to connect and use public Wi-Fi networks. However, if you have never heard of this term, you may be wondering what VPN stands for, how to use one and where you can find one. Read more to learn all about VPNs and their uses.
Discord is a popular messaging platform that is used by both businesses and individuals to communicate. However, its rise in popularity has caused many cybercriminals to flock to this platform. Read more to learn about the security concerns surrounding discord.
With malware on the rise it is more important than ever to stay aware and educated on the threats posed by cybercriminals. Read more to learn about this type of malware and how you can keep yourself safe.
Learn more about one of the most prevalent forms of cyberattack in our world today. Ransomware cost businesses hundreds of thousands of dollars and is only becoming more common. Read more to learn about what ransomware does and how you can protect yourself.
Malware is on the rise and it is more important than ever to learn how to keep yourself and your systems safe.
From small businesses to multinational corporations, cybersecurity is one of the most important investments you can make. Read more about the importance of cybersecurity for small businesses.
With cybercrime on the rise, it is more important than ever to ensure that your employees are properly trained in order to keep your business safe.
It seems that QR codes are being used everywhere now, from restaurants to grocery stores, users are able to scan and access links easily. However, do these codes present a security risk? How safe are they to use?
Is your home security camera as safe as you think it is? These devices can be hacked and you could be watched in your own home and not even realize it. Read more to learn more about how secure your favourite smart devices are.
You may know that some apps are able to track your general location, but do you know exactly how much information these devices are collecting and how detailed this information is?
If you have been on the internet recently you may have seen the topic of Pegasus come up over and over again. This spyware has been the topic of many different news stories, with many individuals concerned about its ability to discreetly spy on users and smartphones. Here is what we know about the spyware so far.
Cyber Unit is proud to be the first corporate sponsor for the CyberGirls initiative! This incredible program was started by started by Confidence Staveley and the CyberSafe Foundation. Read more to learn about this new partnership and our involvement.
Is your home security camera as safe as you think it is? These devices can be hacked and you could be watched in your own home and not even realize it. Read more to learn about if your security camera has been hacked and what you can do.
You may have heard of the privacy and security concerns surrounding Amazon's Alexa. Read more to see when Alexa records, listens and how secure your information is.
Is it safe to use Apple's digital assistant Siri? Although this feature allows users to more easily interact with their smart devices, it also is privy to a host of personal and sensitive information. Learn more about the risks involved with using Siri and how you can keep yourself safe.
Did you know that turning off your location history does not stop Google from tracking you or your personal information? An AP investigation published documented how Google will continue to access your location. Learn how to disable this feature.
Have you ever wondered how secure your favourite social media applications are? Read more to learn about Facebook's privacy policies and if your information is really secure.
Have you ever wondered how secure your favourite social media applications are? Read more to learn about TikTok's privacy policies and if your information is really secure.
Have you ever wondered how secure your favourite social media applications are? Read more to learn about Instagram's privacy policies and if your information is really secure.
Have you ever wondered how secure your favourite social media applications are? Read more to learn about WhatsApp's privacy policies and if your information is really secure.
Have you ever wondered how secure your favourite social media applications are? Read more to learn about Snapchat's privacy policies and if your information is really secure.
Ransomware attacks have become increasingly common in the past few years. Why is this the case and what can we do about it?
You may have heard of the gasoline shortages that occurred after a massive ransomware attack on the Colonial Pipeline. Is it possible that there will be a meat shortage following a cyberattack on the meat supplier JBS? Read the article to learn more about ransomware attacks and how they affect our daily lives.
Not even hospitals are safe from vicious ransomware attacks from cybercriminals. Ransomware attacks are on the rise and are only getting more common for both individuals and large organizations. Take a minute to read about how ransomware is impacting the healthcare industry.
Amazon is turning on Sidewalk for all American customers for all devices dating back to 2018. In a move that many would consider an invasion of personal privacy, the tech conglomerate will be tracking and receiving sensitive information from users. Read to learn more about Sidewalk and how to turn it off.
For many of us, our smartphones play an integral part of our lives. They often contain a wealth of sensitive and private information which makes them an ideal target for cybercriminals. It is important for you to keep your mobile devices safe. Read our blog post to learn some tips on how to keep your mobile devices secure
Last week we posted about the Colonial Pipeline ransomware attack, now there are reports of individuals receiving phishing emails from cybercriminals who are looking to capitalize on the notoriety of this event. Learn about the phishing scam and how to avoid it.
By now, you are probably already aware of phishing, an online scam where cybercriminals impersonate legitimate organizations in an attempt to gain access to your personal information. However, have you ever heard of spear phishing and do you know how to keep yourself safe?
Are your Mac computers bullet-proof? Recently Apple has admitted that Mac computers suffer from a malware problem. Read more about the malware issues involved and how you can keep yourself safe.
Are big professional website like Google safe from cybersecurity breaches? Read more to find out how seemingly legitimate malvertising campaigns can run on professional websites.
If you have been on the internet for any period of time you have probably seen a test that verifies if you are a bot or not, this is a CAPTCHA test. Learn more about how these tests have evolved to become more complex and how they add a layer of online security.
People have been celebrating getting their vaccine, from Instagram stories to posts, you have probably been flooded with not only smiling selfies but also proud photos of vaccination cards. However, posting your COVID-19 vaccination card online can be dangerous and leave you open to identity theft.
Have you heard about the massive gasoline shortages in America at the moment? These shortages are actually due to a cyberattack! Read the post to learn more about how cybersecurity and cyberattacks can lead to changes that affect our daily lives.
A common piece of advice is to change your passwords every 6 months to a year to ensure that you are safe and secure, but does this advice still hold up today? Find out the problems with forcing users to constantly change their passwords and other better alternatives to implement.
There are many cyber security risks associated with working remotely. Do you know how to best keep yourself and your company safe?
Phishing is a common scam used by cybercriminals to try and steal your information. Read more to find out tips on how you can spot and avoid common phishing scams.
Did you know it can take less than one second to breach weak passwords? Take some time today to make sure that your passwords are secure, complex and unique. Read our blog for more tips on how to create a strong password.
It is becoming increasingly popular for toddlers, children and tweens to be using mobile applications. It is important to stay alert to ensure the safety and privacy of your children. Read to learn more!
Endpoints essentially consist of any device or software on a network that would be potential entry points for cybercriminals or malicious activity. Endpoints exist in every network whether that be directly related to your business or even in your own home.
There are tons of ways your information could end up on the Dark Web. Think about every account you’ve ever opened, not just your important financial and government accounts, but even simple everyday accounts you open for online shopping, grocery stores, or social media platforms.
With technology slowly taking over all areas of our life, it can get overwhelming when we receive notifications for updates all the time.
The cryptocurrency world has been booming within the past decade with many investing in and trading digital coins.
From an overarching point of view, your system as a whole has many potential entry points for a cybercriminal to infiltrate, and that’s why it’s important to have protection in place.
Tons of apps will ask for location permissions to be turned on, and it may seem harmless, but these settings may lead to some major security risks.
When you hear about blockchain technology, the first thing many of us think about is cryptocurrency. Blockchain technology does indeed have a major impact on crypto as it allows for safe encrypted trading to take place.
Although online banking resources are extremely convenient, there are a number of risks presented when accessing private financial information online.
Ransomware is one of the fastest-growing methods of cyberattacks due to the high rates of effectiveness. Learn about the signs of a ransomware attack, so you can be ready for the next attack.
We all have old technology we no longer use, but what should we do with it now?
If possible, avoid using public WiFi as there are many security risks at play. But, if you must use it, read more to find out what security practices you should follow.
These days, no one can escape the inevitable cyber-attack, and that's why you need to be prepared for anything and everything.
Automated teller machines (ATMs) have been increasingly targeted for theft and cyberattacks and they’ve also been used as vessels of attack by cybercriminals.
These days many businesses and individuals rely on systems such as Microsoft 365, Google Workspaces, and Dropbox for data storage, communication, and many other tasks. Are these companies responsible if your data gets lost?
WordPress is a quick and easy web publishing platform that is used globally, but is it the right platform for you or your business? We have some important tips you need to consider if you plan on using WordPress.
The bottom line is no computer is safe from cybercrime and that includes Macs. We have some great tips for you if you own a Mac computer.
Have you been receiving somewhat suspicious text messages from large organizations asking you to follow a link? Whatever you do, don't click the link! We have some insightful tips for you!
How safe is the popular communication app WhatsApp? Recent events have shown flaws in the platform's security practices, should you change communication platforms?
Online quizzes are fun and they can be informative at times, but it's important to be cautious when engaging with them.
Before the COVID-19 pandemic hit, the daily average number of phishing and social engineering attacks was around 20,000 per day. We're now seeing those numbers rising above 30,000 attacks each day.
Without proper cybersecurity, it's inevitable that you or your business will fall victim to some sort of cyberattack. Cybercrime is constantly evolving and rates are increasing everyday.
Apps and devices will ask for permission to access your microphone, camera, notifications, network, personal data, or other apps. If you're not careful, you could be allowing major access points to your sensitive systems through these permissions to IoT devices.
Technology is constantly evolving and becoming more intelligent. Facial recognition is one feature that has widely become normalized all around the world.
On average, 2,244 cyberattacks happen daily around the world. To put that in a different perspective, that's a new cyberattack every 39 seconds.
How much trust do you have in your employees? On average, around 59% of employees will steal company data after they leave a company.
Do you think your systems may have been compromised? Or maybe you realized you just suffered a breach? What should you do now?
How can you tell if your mobile device has been compromised? We're going to share some common signs that your device could be breached so you can be aware of potential security risks.
What is the downside to mobile banking apps? With more people using these apps to access their sensitive financial information and credentials, cybercriminals have an incentive to find ways to infiltrate and exploit you and your systems.
Although the COVID-19 pandemic hugely affected the use of communal workspaces in 2020, we're starting to see people return to them as they often assist with productivity.
Almost all cyberattacks are made possible through human error, and that's why it's extremely important to educate not only yourself, but also your employees.
Want to avoid a major home network breach? Here's a simple action you can do to reduce your risk significantly.
Cryptocurrency is not as straightforward as most people assume it is. Here's a breakdown of crypto-wallets so you know exactly what you're getting into.
Social Media platforms are a great way for individuals to connect with others, however, if you're not careful, you could be putting your safety at risk.
Ever wonder how much cybercriminals are paying to gain access to your stolen data? Spoiler... it's not a lot.
Cybercriminals have been calling phone network providers pretending that they are you and asking for access to your account. Here's how you can stop it.
It's very common to receive emails with malicious intent, but it isn't always easy to detect them when they come. One wrong click and all of your sensitive data could be compromised.
An ethical hacker or a "friendly hacker" is someone who has extensive knowledge around cybersecurity systems and uses penetrative testing to invade any vulnerable areas of a company's attack surface to see how effective their defences are.
As a chartered professional accountant (CPA), you hold a great deal of important and private information that may need to be held for years on end. Cybercriminals know this and will target CPA's accordingly.
DNA test kits are easily accessible and affordable, however, studies show that the information shared with users are not always accurate and could lead to misinformation. Alongside this, it is a major privacy issue.
Every time you take a photo using your smartphone, a ton of metadata is collected such as the time and location the picture was taken, and much more.
With more people online shopping, cybercriminals are taking this opportunity to take advantage of online shoppers and to potentially trick them into giving away personal information and funds through malicious activities. The major area we're seeing this take place on is through phishing emails.
Have you been getting odd messages on Facebook from friends or family saying "I think you're in this video" and then attached to that message is a strange link?
Spoofing is the term used to describe a situation when a cybercriminal impersonates a device or user on a network to trick an individual into sharing private information.
Ransomware is on the rise especially with more individuals and businesses moving online. In 2020, we saw huge increases in online activity due to the COVID-19 pandemic, and heading into 2021 and future years, we should expect those numbers to soar even higher.
When a business, organization, or individual experiences a hardware or software vulnerability that has been exploited by a cybercriminal, we call this a zero-day attack.
Many of us use the incognito feature on our browsers for different reasons, but do we really know what the incognito browser hides?
Have you ever come across a suspicious looking email but the website linked to it appears legit or you may have actually used it in the past and it was safe?
If you use Amazon, Facebook, Paypal, Uber, etc., you have probably encountered 2-factor authentication (2FA) messages to your phone usually with a code.While this intention for an added layer of security is a move in the right direction, SMS messages are not the secure route you'll want to receive security codes on.
We are all very accustomed to clicking links and downloading files from our email, and this makes it easy for cybercriminals to find access points to our inboxes.
You may have heard about the recent SolarWinds breach that affected companies like FireEye, Microsoft, the U.S. Treasury, and many more. The Texas-based software company stated that over 18,000 of their clients were breached in some way, however, some more severely than others.
Adware is dangerous because it is automatically displayed or downloaded onto your device when you are online, sometimes without you knowing. The type of software used creates advertising material displayed through online or through an app which ultimately generates revenue for the developer if it's shown or clicked on.
These days, many companies allow their employees to work on their phones. The danger surrounding this is the fact that corporate data is now accessible through mobile devices which typically don't have strong security measures put in place.
A 'deepfake' is a media clip that someone has edited, altered, and manipulated where a person in an existing image or video is replaced with someone else's likeness.
Cybersecurity is not a one-time thing, it’s evolving every day and it’s crucial for you and your employees to keep up to date on emerging threats.
Every time you type in a password to access an account, you’re using one-factor authentication. These days, you’ll need to layer your security better with the help of two-factor or multi-factor authentication.