Ransomware attacks have become increasingly common in the past few years. Why is this the case and what can we do about it?
You may have heard of the gasoline shortages that occurred after a massive ransomware attack on the Colonial Pipeline. Is it possible that there will be a meat shortage following a cyberattack on the meat supplier JBS? Read the article to learn more about ransomware attacks and how they affect our daily lives.
Not even hospitals are safe from vicious ransomware attacks from cybercriminals. Ransomware attacks are on the rise and are only getting more common for both individuals and large organizations. Take a minute to read about how ransomware is impacting the healthcare industry.
Amazon is turning on Sidewalk for all American customers for all devices dating back to 2018. In a move that many would consider an invasion of personal privacy, the tech conglomerate will be tracking and receiving sensitive information from users. Read to learn more about Sidewalk and how to turn it off.
For many of us, our smartphones play an integral part of our lives. They often contain a wealth of sensitive and private information which makes them an ideal target for cybercriminals. It is important for you to keep your mobile devices safe. Read our blog post to learn some tips on how to keep your mobile devices secure
Last week we posted about the Colonial Pipeline ransomware attack, now there are reports of individuals receiving phishing emails from cybercriminals who are looking to capitalize on the notoriety of this event. Learn about the phishing scam and how to avoid it.
By now, you are probably already aware of phishing, an online scam where cybercriminals impersonate legitimate organizations in an attempt to gain access to your personal information. However, have you ever heard of spear phishing and do you know how to keep yourself safe?
Are your Mac computers bullet-proof? Recently Apple has admitted that Mac computers suffer from a malware problem. Read more about the malware issues involved and how you can keep yourself safe.
Are big professional website like Google safe from cybersecurity breaches? Read more to find out how seemingly legitimate malvertising campaigns can run on professional websites.
If you have been on the internet for any period of time you have probably seen a test that verifies if you are a bot or not, this is a CAPTCHA test. Learn more about how these tests have evolved to become more complex and how they add a layer of online security.
People have been celebrating getting their vaccine, from Instagram stories to posts, you have probably been flooded with not only smiling selfies but also proud photos of vaccination cards. However, posting your COVID-19 vaccination card online can be dangerous and leave you open to identity theft.
Have you heard about the massive gasoline shortages in America at the moment? These shortages are actually due to a cyberattack! Read the post to learn more about how cybersecurity and cyberattacks can lead to changes that affect our daily lives.
A common piece of advice is to change your passwords every 6 months to a year to ensure that you are safe and secure, but does this advice still hold up today? Find out the problems with forcing users to constantly change their passwords and other better alternatives to implement.
There are many cyber security risks associated with working remotely. Do you know how to best keep yourself and your company safe?
Phishing is a common scam used by cybercriminals to try and steal your information. Read more to find out tips on how you can spot and avoid common phishing scams.
Did you know it can take less than one second to breach weak passwords? Take some time today to make sure that your passwords are secure, complex and unique. Read our blog for more tips on how to create a strong password.
It is becoming increasingly popular for toddlers, children and tweens to be using mobile applications. It is important to stay alert to ensure the safety and privacy of your children. Read to learn more!
Endpoints essentially consist of any device or software on a network that would be potential entry points for cybercriminals or malicious activity. Endpoints exist in every network whether that be directly related to your business or even in your own home.
There are tons of ways your information could end up on the Dark Web. Think about every account you’ve ever opened, not just your important financial and government accounts, but even simple everyday accounts you open for online shopping, grocery stores, or social media platforms.
With technology slowly taking over all areas of our life, it can get overwhelming when we receive notifications for updates all the time.
The cryptocurrency world has been booming within the past decade with many investing in and trading digital coins.
From an overarching point of view, your system as a whole has many potential entry points for a cybercriminal to infiltrate, and that’s why it’s important to have protection in place.
Tons of apps will ask for location permissions to be turned on, and it may seem harmless, but these settings may lead to some major security risks.
When you hear about blockchain technology, the first thing many of us think about is cryptocurrency. Blockchain technology does indeed have a major impact on crypto as it allows for safe encrypted trading to take place.
Although online banking resources are extremely convenient, there are a number of risks presented when accessing private financial information online.
Ransomware is one of the fastest-growing methods of cyberattacks due to the high rates of effectiveness. Learn about the signs of a ransomware attack, so you can be ready for the next attack.
We all have old technology we no longer use, but what should we do with it now?
If possible, avoid using public WiFi as there are many security risks at play. But, if you must use it, read more to find out what security practices you should follow.
These days, no one can escape the inevitable cyber-attack, and that's why you need to be prepared for anything and everything.
Just like any other device, home security cameras and baby monitors can get hacked. You could be getting watched in your own home by systems you've installed.
Automated teller machines (ATMs) have been increasingly targeted for theft and cyberattacks and they’ve also been used as vessels of attack by cybercriminals.
These days many businesses and individuals rely on systems such as Microsoft 365, Google Workspaces, and Dropbox for data storage, communication, and many other tasks. Are these companies responsible if your data gets lost?
WordPress is a quick and easy web publishing platform that is used globally, but is it the right platform for you or your business? We have some important tips you need to consider if you plan on using WordPress.
The bottom line is no computer is safe from cybercrime and that includes Macs. We have some great tips for you if you own a Mac computer.
Have you been receiving somewhat suspicious text messages from large organizations asking you to follow a link? Whatever you do, don't click the link! We have some insightful tips for you!
How safe is the popular communication app WhatsApp? Recent events have shown flaws in the platform's security practices, should you change communication platforms?
Online quizzes are fun and they can be informative at times, but it's important to be cautious when engaging with them.
Before the COVID-19 pandemic hit, the daily average number of phishing and social engineering attacks was around 20,000 per day. We're now seeing those numbers rising above 30,000 attacks each day.
Without proper cybersecurity, it's inevitable that you or your business will fall victim to some sort of cyberattack. Cybercrime is constantly evolving and rates are increasing everyday.
Apps and devices will ask for permission to access your microphone, camera, notifications, network, personal data, or other apps. If you're not careful, you could be allowing major access points to your sensitive systems through these permissions to IoT devices.
Technology is constantly evolving and becoming more intelligent. Facial recognition is one feature that has widely become normalized all around the world.
On average, 2,244 cyberattacks happen daily around the world. To put that in a different perspective, that's a new cyberattack every 39 seconds.
How much trust do you have in your employees? On average, around 59% of employees will steal company data after they leave a company.
Do you think your systems may have been compromised? Or maybe you realized you just suffered a breach? What should you do now?
How can you tell if your mobile device has been compromised? We're going to share some common signs that your device could be breached so you can be aware of potential security risks.
What is the downside to mobile banking apps? With more people using these apps to access their sensitive financial information and credentials, cybercriminals have an incentive to find ways to infiltrate and exploit you and your systems.
Although the COVID-19 pandemic hugely affected the use of communal workspaces in 2020, we're starting to see people return to them as they often assist with productivity.
Almost all cyberattacks are made possible through human error, and that's why it's extremely important to educate not only yourself, but also your employees.
Want to avoid a major home network breach? Here's a simple action you can do to reduce your risk significantly.
Cryptocurrency is not as straightforward as most people assume it is. Here's a breakdown of crypto-wallets so you know exactly what you're getting into.
Social Media platforms are a great way for individuals to connect with others, however, if you're not careful, you could be putting your safety at risk.
Ever wonder how much cybercriminals are paying to gain access to your stolen data? Spoiler... it's not a lot.
Cybercriminals have been calling phone network providers pretending that they are you and asking for access to your account. Here's how you can stop it.
It's very common to receive emails with malicious intent, but it isn't always easy to detect them when they come. One wrong click and all of your sensitive data could be compromised.
An ethical hacker or a "friendly hacker" is someone who has extensive knowledge around cybersecurity systems and uses penetrative testing to invade any vulnerable areas of a company's attack surface to see how effective their defences are.
As a chartered professional accountant (CPA), you hold a great deal of important and private information that may need to be held for years on end. Cybercriminals know this and will target CPA's accordingly.
DNA test kits are easily accessible and affordable, however, studies show that the information shared with users are not always accurate and could lead to misinformation. Alongside this, it is a major privacy issue.
Every time you take a photo using your smartphone, a ton of metadata is collected such as the time and location the picture was taken, and much more.
With more people online shopping, cybercriminals are taking this opportunity to take advantage of online shoppers and to potentially trick them into giving away personal information and funds through malicious activities. The major area we're seeing this take place on is through phishing emails.
Have you been getting odd messages on Facebook from friends or family saying "I think you're in this video" and then attached to that message is a strange link?
Spoofing is the term used to describe a situation when a cybercriminal impersonates a device or user on a network to trick an individual into sharing private information.
Ransomware is on the rise especially with more individuals and businesses moving online. In 2020, we saw huge increases in online activity due to the COVID-19 pandemic, and heading into 2021 and future years, we should expect those numbers to soar even higher.
When a business, organization, or individual experiences a hardware or software vulnerability that has been exploited by a cybercriminal, we call this a zero-day attack.
Many of us use the incognito feature on our browsers for different reasons, but do we really know what the incognito browser hides?
Have you ever come across a suspicious looking email but the website linked to it appears legit or you may have actually used it in the past and it was safe?
If you use Amazon, Facebook, Paypal, Uber, etc., you have probably encountered 2-factor authentication (2FA) messages to your phone usually with a code.While this intention for an added layer of security is a move in the right direction, SMS messages are not the secure route you'll want to receive security codes on.
We are all very accustomed to clicking links and downloading files from our email, and this makes it easy for cybercriminals to find access points to our inboxes.
You may have heard about the recent SolarWinds breach that affected companies like FireEye, Microsoft, the U.S. Treasury, and many more. The Texas-based software company stated that over 18,000 of their clients were breached in some way, however, some more severely than others.
Adware is dangerous because it is automatically displayed or downloaded onto your device when you are online, sometimes without you knowing. The type of software used creates advertising material displayed through online or through an app which ultimately generates revenue for the developer if it's shown or clicked on.
These days, many companies allow their employees to work on their phones. The danger surrounding this is the fact that corporate data is now accessible through mobile devices which typically don't have strong security measures put in place.
A 'deepfake' is a media clip that someone has edited, altered, and manipulated where a person in an existing image or video is replaced with someone else's likeness.
Cybersecurity is not a one-time thing, it’s evolving every day and it’s crucial for you and your employees to keep up to date on emerging threats.
Every time you type in a password to access an account, you’re using one-factor authentication. These days, you’ll need to layer your security better with the help of two-factor or multi-factor authentication.
If you're getting strange phone calls from numbers that seem local or even have similar digits to your phone number, you are experiencing a type of phone scam called 'Neighbour Spoofing.'
With more and more businesses opening back up and hiring new individuals, cybercriminals have taken this opportunity to lure individuals with fake job listings to gain access to your personal information.
Be aware of what you share on social media as it might give away valuable information to hackers and lead to a breach in your data.
Working from home these days? You need to know about these 3 things in your home office that can lead to a breach.
Local backups are fast, efficient and can be easily accessed whenever required. However, local backups are vulnerable to ransomware, which can potentially spread across your network.
Email scams are not the only form of phishing, are you familiar with the terms “Vishing” and “SmiShing”?
Cybercrime is ever rampant these days and many individuals feel that cybersecurity is not necessary. Meanwhile, every 39 seconds a new cyberattack happens.
Most of us don’t think twice about scanning a new QR code, but just like clicking an unknown link, QR codes can carry suspicious activity or malware that can infiltrate your device.
Most of us know what phishing is. But are you familiar with the terms “spear-phishing” and “whaling”?
We all know how important it is to have a strong and unique password for different devices and apps, but how do we manage all of them?
Credit card fraud has increased by 71% over the past decade with financial losses averaging around $800 million in 2019 alone.
With more shoppers browsing and making transactions online, we will most definitely see an increase in online scams and phishing attacks.
The popular video-sharing social media platform TikTok has become increasingly more popular especially amongst the younger generation. While the app is used to create funny and informative short videos mostly for enjoyment purposes, it tends to collect a lot more data on its users than other apps.
Do you use SMS messaging to share corporate data or private information? You might want to find a more secure messaging platform that has end-to-end encryption.
Phishing emails are becoming more common and more sophisticated. You might have some phishing emails in your inbox right now and you may not be able to tell.
It all starts with your home wireless network. These days, it isn’t just connected to our computers and phones, but things such as Google Home devices, video game consoles, printers, security cameras, smart watches, and even your lights.
As kids around the world slowly ease back into school, education systems find themselves dealing with new challenges, especially in relation to online learning.
The Dark Web is essentially the world wide web that exists on darknets. This ‘underground’ web is often where illegal activity takes place such as illegal trade, media, forums, terrorism, child pornography etc.