It's as Easy as This... Sometime in late 2019, an employee with the Saskatchewan Health Authority (SHA) plugged a personal device into their work computer to charge it. The device had a file infected with the Ryuk ransomware package. While connected, they opened a...
Risks
Using a Tabletop Exercise to Plan in These Uncertain Times
With Canada solidly in a "second wave" situation and Alberta's infection rates soaring, businesses have good reason to be concerned. Do you know how your business will survive if a key person on your team needs to quarantine for 2 weeks or worse? Does your business...
New Facebook Phishing Attack Could Fool Many
I just received a Facebook Messenger message from a good friend yesterday. He apparently saw me in a video and thought I'd be interested in watching it. He's a friend who does send me interesting stuff once in a while and there was no reason not to click through....
A Ransomware Attack that Turned into a Horror Story
October is Cybersecurity Month and the Canadian CyberSecurity Conference, MapleSEC, is running October 5 - 7. On Monday, Terry Cutler of Cyology Labs in Montreal shared a case study of a major Canadian company hit by ransomware. “IT guys are always asking for money,”...
Malware Email is on the Increase: Protect Your Business with Email Quarantines
Google is a security conscious company. I almost never get unfiltered spam or phishing attacks in my regular inbox.* By default, Google sends suspicious mail to the Junk E-mail folder (if it looks like spam but doesn't seem to contain anything harmful), or Google...
QNAP NAS appliances at risk of malware
Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...
3 Things to Watch for in Preventing Business Email Compromises (BEC)
Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.
What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.
DNS Firewalls: A New Tool to Protect your Business
If your computer connected to a DNS Firewall instead of a regular DNS and you typed in “yotube.com” (note the missing “u” from “you”), the attack will be thwarted. Yotube.com is a known phishing site that tries to download malware (viruses, worms, ransomware, botnets, etc.) to anyone who mistakenly tries to visit it.
Twitter Hacked: What is Social Engineering?
Yesterday, Twitter announced that it had been hacked. Hackers seemed to target a number of accounts belonging to cryptocurrency companies and executives as well as VIP accounts of Joe Biden, Barack Obama, Kanye West, Bill Gates, and Elon Musk and others. The target...
Hate-hacking, Zoom Bombing and Working Remotely in the Era of BLM
Working remotely has become the preferred technique of many businesses as they pivot to serving clients and customers in the age of COVID-19. Moving to a hybrid work environment with some employees working from home while others continue working out of the office...
What’s this Buzz about Zoom? What Else is There?
In a time when we are starved for human connections in our personal lives and virtual meeting options in our business lives, Zoom came along. It was slick and well marketed. Sure the free version was limited to 40 minute calls if you had a party of 3 or more, but it...
How Can I Protect Myself from SIM Swapping?
Before we get to "SIM Swapping", two Factor Authentication (or 2FA) is also a term that has been in the news recently. It is a way of securing your email, banking, and social media accounts by requiring you to authenticate using more than one factor to prove your...