Blogs
Categories
- 8 tips
- alberta
- audit
- becyberaware
- british columbia
- business
- Business awareness
- call center
- canada
- Canadian
- canadian business
- chat support
- checklist
- co-managed IT
- common phishing signs
- companies
- company
- company culture
- computer security
- customer support
- Cyber Security
- cyber security analyst
- cyber security companies
- cyber security cyber security analyst cyber security news cyber security careers cyber security companies cyber security engineer
- cyber security engineer
- cyber security information
- cyber security news
- cyber security programs
- cyber security threats
- cybercrime
- Cybersecurity
- Cybersecurity defense
- cybersecurity training
- cyersecurity
- data breach
- device scam
- device security
- employee training
- fake emails
- freeupspace
- hackers
- health
- healthcare
- home security
- how to
- Indigenous Owned
- IoT
- kaseya
- kaseya attack
- malware
- managed service provider
- managedIT
- management
- manitoba
- medium size business
- MFA
- Microsoft
- MicrosoftDefender
- mobile
- mobile attacks
- morespace
- MSP
- multi-factor authentication
- new brunswick
- north west territories
- nova scotia
- nunuvut
- online
- online reputation
- ontario
- pei
- phishing
- phishing email
- phone breach
- phone hacked
- prince edward island
- quebec
- ransomware
- ransomware attack
- remote workers
- safe harbor
- Safe Harbour
- safe harbour informatics
- saskachewan
- scams
- sgn
- SLAM
- small business
- smishing
- storage
- two-factor
- typesofhackers
- USA Business
- vpn
- wifi
- windows
- windows10
- yukon
Secure Boot Bypass Puts Countless Devices at Risk
Posted by Norma Stratton on

Whatever else you can say about cyberattackers, they are an innovative bunch and are always quick to pounce on any potential weakness. Unfortunately, the “BootHole” bug has given them a new opportunity to target billions of devices to load malware, access sensitive information, and much more. The bug in question is in the GRand Unified Bootloader version 2, referred to as GRUB2. For most computer systems, GRUB2 is the default loader and manages part of the system’s start-up process by either presenting a menu requiring input from the user, or by transferring control to an operating system kernel. When starting...
Your Router Could Be a Linux Security Risk
Posted by Norma Stratton on

Your Router Could Be a Linux Security Risk We all want to be confident that our networks are secure, but it might come as a surprise that the biggest threat to your security might actually be your router. A recently published report has revealed that many popular home routers possess a number of vulnerabilities that create weak points in your network security. Many these routers never receive firmware updates over the course of their lifetime, leaving you vulnerable to hundreds of known security issues. These gaps in your security can lead to compromises of personal information, which in turn can lead to...
The New Malware That Can Steal Passwords and Card Data
Posted by Norma Stratton on

There’s a new malware strain in town, and it definitely deserves your attention. Known as BlackRock, this Android malware is based on the leaked source code of the Xerxes malware and can target 337 apps, including email, media, and banking apps. BlackRock works in the same manner as most Android malware. It can perform overlay attacks and is able to send, spam, and steal SMS messages. It can also lock victims in the home screen, hide or steal notifications, and deflect antivirus software. While this is similar in function to other Android banking Trojans, the key difference with BlackRock is...
Uninstall These Apps That Google has Removed from the Play Store
Posted by Norma Stratton on

Uninstall These Apps That Google has Removed from the Play Store Malware is in the news again with both the arrival of BlackRock, which is known to affect 337 apps, and with Google removing 11 infected apps from the Play Store. Each of these apps were found to be infected with the Joker malware, a Trojan that activates when the user interacts with it, often in the form of installing an app. The virus slips past the device’s security to steal information, or even cripple the device. Joker was first discovered in 2017 and is one of the most widespread...
Remote Work Makes Cybersecurity More Important Than Ever
Posted by Norma Stratton on

The New Normal of Remote Work Makes Cybersecurity Basics More Important Than Ever The past several months have brought about a number of changes, not the least of which is the number of people who have begun to work from home. While this brings certain benefits for both employers and employees, it also points to the fact that cybersecurity and the protection of sensitive data is more important than it has ever been. In March of this year, large numbers of employees began working remotely, often bringing corporate devices home with them to enable them to do their jobs from...