Security

Learn about Security on our blog

How to Charge your Phone for $107 Million

It's as Easy as This... Sometime in late 2019, an employee with the Saskatchewan Health Authority (SHA) plugged a personal device into their work computer to charge it. The device had a file infected with the Ryuk ransomware package. While connected, they opened a...

read more

Lessons from the US Treasury Cyberattack

On December 13, 2020, the US Government announced a major cyberattack on the US Treasury and Commerce departments. When you are a US government department, smaller hackers don't stand a chance against the routine security procedures of these organizations. These were...

read more

What Can You Do With an Old Computer?

There comes a time when every computer has lived out its usefulness. What to do with old hardware? Manage Your Risks First of all, consider the risks. Running any Windows version earlier than Windows 10 is a huge risk. Older versions of Windows including: 7, Vista,...

read more

New Facebook Phishing Attack Could Fool Many

I just received a Facebook Messenger message from a good friend yesterday. He apparently saw me in a video and thought I'd be interested in watching it. He's a friend who does send me interesting stuff once in a while and there was no reason not to click through....

read more

Can You Trust Your Lawyer?

Law firms and lawyers are a profession we sometimes need to rely upon. We depend upon them to manage family matters, custody issues, contract disputes, and criminal matters. Many times, these issues are personally, professionally, or economically sensitive. For this...

read more

Have You Been Owned/Pwned?

The term "Pwned" comes from video game culture and means "owned" (since the "o" and "p" characters are beside each other on a keyboard). Pwned implies domination, humiliation and ownership by an opponent. It is a taunt that you have been soundly defeated. "Pwned" has...

read more

Complexity Made Simple: A Case Study of a Phishing Attack

Today a small business owner became the victim of a phishing attack and almost lost access to their email account including: Bank emails Personal communications Professional communications Because email is a critical step in changing a user's password, if the owner...

read more

Ransomware Red Flags: 7 Signs You’re About to Get Hit

It's every security pro's nightmare: Your company has been hit with ransomware, and every machine and server has been encrypted. Shocked? Likely, but security experts say the warning signs were there all along. Misdirected DNS requests, bad VPN reboots, and Active...

read more