2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Blog

IT Services & IT Solutions Mississauga & Toronto

VPN connection

Secure Your Work-from-Home VPN Connections

With COVID-19 being declared a pandemic by the World Health Organization (WHO), government-mandated quarantines and self-imposed social distancing are now becoming widespread occurrences in over 100 countries. In this environment, many organizations now rely on work-from-home for many of their employees. These remote workers rely on VPNs in order to connect to their companies’ network.…
Read more

cathay pacific cyberattack

Lessons Learned From The Cathay Pacific Data Breach

Hong Kong airline company Cathay Pacific was fined 500 000 pounds by the UK Information Commissioner’s office due to a data leak where 9.4 million user records were leaked. Of the affected individuals, over 100 000 were from the UK. The data breach was the result of unauthorized access to Cathay Pacific’s servers that dated…
Read more

remote connection

Remote Connections Can Become Security Vulnerabilities. How Can You Protect Your Network?

What are the dangers of remote connections? Remote work, which relies on establishing a secure connection between an employee’s home computer and the company network, can become a security vulnerability if left without any security measures. The security risks associated with remote work are not limited to cyberattackers that are trying to access your network…
Read more

resort

10.6 Million Customer Records Leaked by MGM Resorts

Over 10.6 million customer data records were leaked by the MGM Resorts Hotel in a recent data breach. Information that was leaked to the public included customer addresses, phone numbers, birthdays, and email addresses. The information was posted publicly on a hacking forum. In the post-leak security audit, MGM discovered that the breach was caused…
Read more

ssh keys

SSH Key Malware Is Spreading

What are SSH Keys? SSH, or Secure Shell, is a method used to establish a secure login between two systems. It is widely used across many operating systems. Using an SSH key, an IT administrators can gain access to servers and computers. Because SSH keys do not expire, and unauthorized individual in possession of and…
Read more

trojan malware

The Emotet Trojan Malware Is Spreading Through Wifi

The Trojan malware strain known as Emotet has been in circulation ever since 2014. Early versions of the malware aimed to steal sensitive information or credentials after infecting victims’ computers. Up until recently, it was believed that the only way that Emotet trojan could infect a computer was through malicious email links. However, it was…
Read more

How Will Artificial Intelligence (AI) Change Cybersecurity?

Artificial Intelligence Artificial intelligence is the field of computer development concerned with simulating human problem solving and cumulative learning in computers. Systems with artificial intelligence get progressively better at doing tasks that they are designed to do, without the need for humans to ‘hard program’ new techniques or strategies for them. There are many advantages…
Read more

netherlands university clop ransomware

Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption

Netherlands’ Maastricht University was hit by a ransomware attack on December 23rd, 2019. The university paid the cyberattackers 30 bitcoins, worth at around $220 000 USD, in order to restore the infected computers to working conditions. The ransomware malware strain, called “Clop ransomware”, encrypted 267 of the university’s Windows servers, including backups. The University’s full…
Read more

insurance company calculator

Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack

On October 8th 2019, an unnamed Canadian insurance company paid a total of 950 000 USD to a ransomware cyberattacker. The attacker was able to infect 20 servers and around 1000 employee computers in the attack, encrypting data on the systems behind a ransomwall, demanding payment of 109.25 bitcoins for the safe release of the…
Read more
customer data files

Microsoft Exposed 250 Million Customer Support Logs

Microsoft recently announced that customer data was leaked following a permissions misconfiguration in its internal systems. The misconfiguration occurred on December 5th 2019. It was repaired on December 29th after Cybersecurity Professional Bob Diachenko discovered the leak and alerted the company on that same day. Microsoft assured the public that most of its sensitive data…
Read more