2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Blog

IT Services & IT Solutions Mississauga & Toronto

Considerations when Choosing an MSP

A managed service provider (MSP) can help your business centralize its IT management, reducing resource and financial strain and helping your company boost productivity. Since 2018, many organizations have been affected in some way by cyberattacks or cyberattack threats, and many attacks result in devastating financial losses. An expert IT solutions provider can help your…
Read more

The Pros and Cons of Multifactor Authentication (MFA)

The COVID-9 pandemic has caused many organizations to shift to a work-from-home model of business functioning. This has in turn lead to an increase in reliance of multifactor authentication (MFA) to secure RDS and VPN connections. While MFA has many security benefits, it also poses a number of risks as well. How does MFA Work?…
Read more

Tips on Detecting and Handling Cyberattack

Canada, along with Australia, New Zealand, UK and the US have issued a joint advisory with the goal of assisting organizations in protecting themselves against cyberattack. The report, called “Technical Approaches to Uncovering and Remediating Malicious Activity” provides tips to discovering malicious activity in a corporate network, as well as steps to mitigate risk of…
Read more

Securing Organization Network Entry Points

According to a recent report by CrowdStrike Intelligence, a recent malicious campaign called “Pioneer Kitten” has started to sell access to compromised company networks on online black market forums, demonstrating the increasing important of securing company networks against cyberattack. In the world of COVID-19, many companies are relying on remote connections and VPNs for remote…
Read more

Vishing Attacks are On the Rise

A joint statement was recently issued by the FBI and US Cybersecurity and Infrastructure Security Agency (CISA), notifying organizations of a recent increase in vishing attacks. Vishing attacks are a subset of phishing attack that specifically targets phones and VoIP connections. Generally, phishing attacks use email as its primary method of communication. In a phishing…
Read more

Cyberattack breaches thousands of Canadian Government Accounts

The government of Canada has released a statement that thousands of Canadian government accounts have been compromised following a cyberattack. The Treasury board of Canada stated that the attackers exploited the government’s GCKey system. This system is an SSO protocol used by 30 Canadian federal governments. It allows public users to access government service pages,…
Read more

$25 Million Extorted by NetWalker Ransomware

During the last 5 months while the COVID pandemic has been affecting businesses everywhere, the ransomware dubbed “NetWalker” has extorted over $25 million from organizations around the world. Cybersecurity researchers from McAfee reported that between March 1st and July 27th of last year, NetWalker had net 2795 bitcoin, which was valued at USD $25 Million…
Read more

Canadian Centre for Cyber Security reports that Canadian Companies Attacked Using Unpatched Devices

The Canadian Centre for Cyber Security has reported that several Canadian companies’ networks have recently been compromised due to inadequate security and unpatched devices. They state that in both cases, the network was compromised as a result of insecure 2 factor authentication policies, or servers that were running software with known vulnerabilities. According to the…
Read more

Web-Based Application Cyberattacks

With the COVID-19 Pandemic, businesses rely on cloud applications more than ever. These applications have become essential to remote workers as tools for collaboration and productivity. Microsoft has found that an increasing amount of cyberattackers are using online web-based applications to attack cloud services such Office 365. Partner Group PM Manager at Microsoft Agniezka Girling…
Read more

Ransomware and Data Breaches

Data Breaches and Ransomware Attacks Ransomware attacks are becoming increasingly widespread. Companies are increasingly identifying them as data breaches as the attacks often result in compromised data. This categorization change is significant, as it prompts ransomware victims to notify affected individuals that their information may have been compromised during the attack. In a recent ransomware…
Read more