Law firms and lawyers are a profession we sometimes need to rely upon. We depend upon them to manage family matters, custody issues, contract disputes, and criminal matters. Many times, these issues are personally, professionally, or economically sensitive. For this...
Security Products and Services
“G-Suite” is Changing to “Google Workspace”: What Does This Mean?
Google is rebranding "G-Suite" to "Google Workspace." It's about time. When Atlas became a G-Suite Reseller, we decided to call our offering a "Digital Workspace Solution." It was G-Suite bundled with an optional backup solution. We're glad Google listened to...
Have You Been Owned/Pwned?
The term "Pwned" comes from video game culture and means "owned" (since the "o" and "p" characters are beside each other on a keyboard). Pwned implies domination, humiliation and ownership by an opponent. It is a taunt that you have been soundly defeated. "Pwned" has...
A Ransomware Attack that Turned into a Horror Story
October is Cybersecurity Month and the Canadian CyberSecurity Conference, MapleSEC, is running October 5 - 7. On Monday, Terry Cutler of Cyology Labs in Montreal shared a case study of a major Canadian company hit by ransomware. “IT guys are always asking for money,”...
Complexity Made Simple: A Case Study of a Phishing Attack
Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...
As of September 1, Multi-year SSL Certificates Will No Longer Be Trusted
What is an SSL Certificate? SSL certificates verify that the website you are visiting: Is proven to belong to who they say they are (for example, an SSL certificate signed for www.rbcroyalbank.com won't work for www.rbcroyalbank.cn) cannot be read or deciphered by...
Ransomware Red Flags: 7 Signs You’re About to Get Hit
It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...
Malware Email is on the Increase: Protect Your Business with Email Quarantines
Google is a security conscious company. I almost never get unfiltered spam or phishing attacks in my regular inbox.* By default, Google sends suspicious mail to the Junk E-mail folder (if it looks like spam but doesn't seem to contain anything harmful), or Google...
Google? No Thanks; We Use Microsoft (Part-2)
(If you haven't read part 1, you can do so here.) In this article, we'll talk about Google Drive File Stream. Perhaps you've used the free Google Drive. Unless the document you create or open a Google doc of some sort (doc, sheet, slide, etc.) you have to download it,...
QNAP NAS appliances at risk of malware
Does your business use a QNAP Network Attached Storage (NAS) device? If so, the Cybersecurity & Infrastructure Security Agency (CISA) urges you to update the firmware to the latest release level. Hackers released a malware known as QSnatch in 2019 targeting QNAP...
3 Things to Watch for in Preventing Business Email Compromises (BEC)
Cyber crime is up during a pandemic and one of the easiest tricks for criminals is to fake or spoof business emails that appear to come from your company. One common technique is known as Business Email Compromise or BEC. The FBI estimates that BEC scams have cost organizations $26 Billion in losses over the past 3 years.
What is BEC? BEC occurs when a cybercriminal is able to use a compromised business email account with the goal of transacting fraud with an unsuspecting employee or vendor. Companies can lose millions with only a few clicks.
DNS Firewalls: A New Tool to Protect your Business
If your computer connected to a DNS Firewall instead of a regular DNS and you typed in “yotube.com” (note the missing “u” from “you”), the attack will be thwarted. Yotube.com is a known phishing site that tries to download malware (viruses, worms, ransomware, botnets, etc.) to anyone who mistakenly tries to visit it.