Blogs — Cyber Security
Categories
- 8 tips
- alberta
- audit
- becyberaware
- british columbia
- business
- Business awareness
- call center
- canada
- Canadian
- canadian business
- chat support
- checklist
- co-managed IT
- common phishing signs
- companies
- company
- company culture
- computer security
- customer support
- Cyber Security
- cyber security analyst
- cyber security companies
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
- cyber security engineer
- cyber security information
- cyber security news
- cyber security programs
- cyber security threats
- cybercrime
- Cybersecurity
- Cybersecurity defense
- cybersecurity training
- cyersecurity
- data breach
- device scam
- device security
- employee training
- fake emails
- freeupspace
- hackers
- health
- healthcare
- home security
- how to
- Indigenous Owned
- IoT
- kaseya
- kaseya attack
- malware
- managed service provider
- managedIT
- management
- manitoba
- medium size business
- MFA
- Microsoft
- MicrosoftDefender
- mobile
- mobile attacks
- morespace
- MSP
- multi-factor authentication
- new brunswick
- north west territories
- nova scotia
- nunuvut
- online
- online reputation
- ontario
- pei
- phishing
- phishing email
- phone breach
- phone hacked
- prince edward island
- quebec
- ransomware
- ransomware attack
- remote workers
- safe harbor
- Safe Harbour
- safe harbour informatics
- saskachewan
- scams
- sgn
- SLAM
- small business
- smishing
- storage
- two-factor
- typesofhackers
- USA Business
- vpn
- wifi
- windows
- windows10
- yukon
What is a Data Breach and How Do You Protect Yourself
Posted by Norma Stratton on
You have no doubt heard about data breaches happening over the past few years, but you may be unsure of what a data breach entails. In essence, a security breach is when private information is accessed by someone without permission to do so. With companies collecting and storing personal information about their customers, this can prove harmful to all parties involved; companies lose face and the trust of their customers, while individuals have their personal information exposed. Companies suffering a data breach have far more to worry about than just a loss of customer confidence—the average cost incurred by companies...
- becyberaware ,
- Business awareness ,
- canadian business ,
- Cyber Security ,
- cyber security companies ,
- cyber security information ,
- cyber security news ,
- cyber security programs ,
- cyber security threats ,
- Cybersecurity ,
- data breach ,
- safe harbor
Legal Consequences of a Cyberattack
Posted by Safe Harbour Informatics Incorperated on
If you have any doubts about your system’s ability to withstand a cyberattack, then you likely need to upgrade. If you do not, you could find yourself facing serious fines and legal issues in addition to a serious blow to your reputation. Data breaches are on the rise, but preparedness is not keeping pace, particularly among small- and mid-sized businesses. This means they are at greater risk of legal consequences as they are legally required to protect customer data in their possession. Cyber law is constantly evolving to ensure that proper protections are put into place. Failing to adequately protect...
- Business awareness ,
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security information ,
- cyber security news ,
- cyber security programs ,
- cyber security threats
Facebook Ads Taken Out by Ragnar Locker Ransomware
Posted by Norma Stratton on
Facebook Ads Taken Out by Ragnar Locker Ransomware as a New Tactic The Ragnar Locker ransomware group followed up their November 3rd attack on Italian liquor producer Campari by taking out Facebook ads in which they threatened to release 2TB of stolen data if they did not receive $15 million paid in Bitcoin. Campari Group acknowledged the attack. Double-Extortion with a Twist This new tactic is a twist on the existing double-extortion tactic, which sees cyber criminals lock organizations out of their own systems and then threatening to release stolen data to the public unless their demands were met. By using...
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security news
It’s Time to Take Data Seriously in 2021
Posted by Norma Stratton on
It’s Time to Take Data Seriously in 2021 Everyone in a position of leadership will find themselves having to make decisions. Sometimes they will be easy, sometimes exceedingly difficult. When you run a business, your decisions can impact hundreds or even thousands of lives, so how do you ensure that you are making the right decisions? What it all comes down to is making informed decisions and to be informed, you require data. While proper decision-making has always relied on having good data, it is more important than ever as we head into 2021, with data management and analysis taking...
- Cyber Security ,
- cyber security analyst ,
- cyber security companies ,
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer ,
- cyber security engineer ,
- cyber security news ,
- remote workers
How Remote Working is Making Cyberattacks Easier to Pull Off
Posted by Norma Stratton on
How Remote Working is Making Cyberattacks Easier to Pull Off The unique challenges of this year have forced companies the world over to make significant changes and adapt quickly to survive. Many businesses have allowed employees to work from home, and in many cases, this resulted in a positive change. Some stores, for example, have not only endured, but thrived by switching to an e-commerce model. Unfortunately, cyber criminals have also been quick to adapt, with less-than-desirable results. The necessity for businesses to remain digitally connected has resulted in an increase in ransomware attacks. And not only have they increased...