Blogs — cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
Categories
- 8 tips
- alberta
- audit
- becyberaware
- british columbia
- business
- Business awareness
- call center
- canada
- Canadian
- canadian business
- chat support
- checklist
- co-managed IT
- common phishing signs
- companies
- company
- company culture
- computer security
- customer support
- Cyber Security
- cyber security analyst
- cyber security companies
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
- cyber security engineer
- cyber security information
- cyber security news
- cyber security programs
- cyber security threats
- cybercrime
- Cybersecurity
- Cybersecurity defense
- cybersecurity training
- cyersecurity
- data breach
- device scam
- device security
- employee training
- fake emails
- freeupspace
- hackers
- health
- healthcare
- home security
- how to
- Indigenous Owned
- IoT
- kaseya
- kaseya attack
- malware
- managed service provider
- managedIT
- management
- manitoba
- medium size business
- MFA
- Microsoft
- MicrosoftDefender
- mobile
- mobile attacks
- morespace
- MSP
- multi-factor authentication
- new brunswick
- north west territories
- nova scotia
- nunuvut
- online
- online reputation
- ontario
- pei
- phishing
- phishing email
- phone breach
- phone hacked
- prince edward island
- quebec
- ransomware
- ransomware attack
- remote workers
- safe harbor
- Safe Harbour
- safe harbour informatics
- saskachewan
- scams
- sgn
- SLAM
- small business
- smishing
- storage
- two-factor
- typesofhackers
- USA Business
- vpn
- wifi
- windows
- windows10
- yukon
How Remote Working is Making Cyberattacks Easier to Pull Off
Posted by Norma Stratton on
How Remote Working is Making Cyberattacks Easier to Pull Off The unique challenges of this year have forced companies the world over to make significant changes and adapt quickly to survive. Many businesses have allowed employees to work from home, and in many cases, this resulted in a positive change. Some stores, for example, have not only endured, but thrived by switching to an e-commerce model. Unfortunately, cyber criminals have also been quick to adapt, with less-than-desirable results. The necessity for businesses to remain digitally connected has resulted in an increase in ransomware attacks. And not only have they increased...
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security news ,
- remote workers
What top Security Mistakes That Make Your PC Vulnerable
Posted by Safe Harbour Informatics Incorperated on
Common Security Mistakes That Make Your PC Vulnerable The trend toward greater digital connectivity took a big leap this year as countless employees the world over found themselves working at home, along with students attending online courses and everyday people seeking to stay connected with friends and family, do their shopping, and more. The end result is greater exposure to cyber criminals who have been quick to take advantage of this “new normal.” Unfortunately, many assume that these criminals are primarily concerned with attacking businesses and governments, but information is power and that includes your personal data, which you may...
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security news
Uncovering a Phishing Email Scam Network
Posted by Norma Stratton on
Uncovering a Scam Network It’s unfortunate, but virtually anyone who has a phone or computer has encountered a scam at some point. Sometimes they are extremely obvious and easy to avoid. Other times, they appear legitimate and catch even wary victims off guard. When encountering a suspected fraud, victims will usually turn to their credit card company or other payment processor to seek a refund, but there are times when they are not successful, as with the PayPal-UPS scam. But what is this scam and how does it work? The PayPal-UPS Scam This scam is relatively simple to execute, but...