Botnets are robot networks made up of computers, or any device with network connectivity (computers, security cameras, smart TV’s, smart thermostats, etc.). Botnets have a long history in technology, as they have been around since the early days of the internet. While commonly perceived to be malicious in intent (and rightfully so), botnets do not exclusively perform destructive commands. Read more
Articles tagged: cyber threat
How Microsoft’s Edge Browser Leads with Security
Ottawa wins top rankings, in a game no one wants to be playing.
It is the malware infections (including phishing and ransomware) rate that Ottawa ranks highest in, even when compared to a city like Toronto where the population is significantly higher. Our city has taken notice, as Ottawa Hospital, Carleton University and several non-profit charities have fallen victim. In an effort to combat the attacks, Prime Minister Justin Trudeau announced last summer the public consultation on cyber security strategy, while the IT industry as a whole strives to share threat information about emerging threat vectors. Read more
Canadian Digital Privacy Act (Part Two)
The Digital Privacy act, originally passed in 2015, has updated elements of its legislation that will require Canadian businesses to adhere to strict guidelines and policies in order to protect confidential information and disclose security breaches. While each organization will have to prioritize its defenses, there will be certain criteria every one will have to follow. While official standards will be released later this year, there are steps you can and should implement immediately to improve you company’s security posture. Read more
Canadian Digital Privacy Act (Part One)
As a response to the ever-evolving cyber-security threats Canadian businesses face in daily internet interactions, the federal government has responded. Later this year, newly drafted hacking disclosure legislation will require all businesses in Canada to report any cyber security breach as soon as they become aware of it. Read more
Dangers of a Bug Bounty
Bug bounties have good intentions but in a world where cyber warfare is a reality, it can lead to complex consequences were ethics and espionage come into play. When private companies compete to outbid each other’s bounties, it can create a dangerous playing ground that could potentially put million’s of users sensitive information at risk. Read more
Malware: The New Weapons of Mass Destruction
Canadian businesses are quick to adopt modern technologies into their workplace. It’s how we remain competitive and connected to clients, partners and industry news. But the advancement of malware and constant security attacks makes it increasingly nerve-wracking to those who interact with sensitive business data. Our dependence on the internet makes us a prime target for cyber criminals. But its not just small time hackers, looking to wreak havoc on our computer systems. Cyber-warfare and state-sponsored attacks are on the rise and for many large countries are a central element to their military strategies. Read more
Security Tips for End Users
The Bad News:
Security attacks and cyber criminals target every business of every size. At this point, there is no 100% guaranteed protection against malware, ransomware or phishing attempts. In 2015, there were nearly 2,500 known complaints of ransomware reported to the FBI, amounting to $1.6 million in losses. Read more
Ransomware is Threatening Your Business
Ransomware is a threat to everyone in your organization. Businesses today are under constant attack from various security threats. It’s important that every user connected to your network understands how they are being targeted. When the impact ransomware could have on your business is understood, end users and your IT service provider can work together to provide the best protection. Read more
SSL Certificate: Why we have one, and you should too!
A SSL certificate is a commonly used security technology recommended for businesses with an online presence. Since a company’s website is a critical component to conducting business in today’s marketplace, it’s important to have your site promote a secure experience. In an effort to gain consumer’s trust and in light of ever-growing security threats, it’s best practice to have a SSL certificate installed to allow a secure connection from your web server to your visitors’ web browser. Read more
Understanding the Cyber Exploit Cycle- Part 2
With the rise of cyber attacks happening across all industries and markets we will examine specific recommendations made by the Communications Security Establishment (CSE). CSE’s recommendations are used to protect our nation’s network and can be used as a guide by SMB’s to build a defense against cyber exploits and protect their own infrastructure. Read more