2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Category: IT Services

IT Services & IT Solutions Mississauga & Toronto

work-731198_960_720

3rd Party Programs: Are They Cybersecurity Weakpoints?

Almost 400 dental offices were infected with ransomware in a cyberattack this August. The computers became infected after DDS Safe, a 3rd party cloud backup software that all the affected offices were using, was compromised. The software was developed by Dental Technology Company PerCSoft. Affected offices had their computer files encrypted behind ransomwalls. On August…
Read more
technology icon gallery

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more
ransomware security keyboard

22 Governments in Texas Hit By First Coordinated Ransomware Attack

On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments. While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According…
Read more

Prnter_iot_device

Cyberattackers Are Targeting IOT Devices: How Do You Defend Yourself?

A new threat group, called “STRONTIUM”, was recently discovered by the Microsoft Threat Intelligence Center (MSTIC). In April 2019, this cyberthreat infiltrated private company networks through 3 different IoT devices – a VoIP phone, printer, and video decoder. The Microsoft researchers reported that the devices were compromised as a result of the devices running out-of-date…
Read more

cyber-security-1805246_960_720

106 Million Affected By Capital One Data Breach

In one of the largest financial data theft incidents in history, Capital One Financial Corporation reported on July 19th 2019 that around 106 million of its clients’ data was leaked due to cyberattack. Of the affected, 100 million are located in the U.S. and 6 million in Canada. Capital One announced that personal client information…
Read more
coding

A Windows BlueKeep Exploit Is Now Commercially Available

Immunity Inc., an IT security consulting company, announced that a BlueKeep Exploit will now be included in CANVAS – the company’s commercially available security penetration-testing tool. BlueKeep is a security vulnerability that affects Windows 7, Windows 2003, Windows XP, Windows Server 2008 R2, and Windows Server 2008. Also known as CVE-2019-0708, the flaw allows attackers…
Read more
fileless_malware_image

Fileless Malware is Difficult to Detect, Dangerous, and On-The-Rise

Fileless Malware Attacks are on the rise. The Canadian Centre for Cyber Security warns the public to watch out for this dangerous type of cyberattack. Fileless malware attacks are a particularly dangerous strain of malicious software (malware) that are difficult to detect due to their ability to exploit your own programs to mask themselves. This…
Read more
scam_phishing_small

Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting

Multinational insurance company CFC Underwriting says that human error still remains a primary factor in the thousands of cybersecurity insurance claims that the company handles. In 2018, the insurance company received over a thousand claims relating to ransomware, malware, data breaches, and data theft. Of these incidents, CFC Underwriting notes that the following human-driven errors…
Read more

Why you should avoid SMBv1 in 2019

A server computer acts as a central hub to any organization’s IT infrastructure. It is the core that all other computers are connected to, and stores and shares information among them. Much like personal computers, servers rely on operating systems and programs to carry out their functions. One of such software, called SMBv1, has been…
Read more

Data Exposure: How do you avoid it?

The first major data exposure of 2019 has occurred. VOIPo, a Voice-Over-IP service provider based in California, accidentally publicized its databases, leading to almost 7 million VOIP call logs, message logs, and other sensitive information being leaked. The leak was discovered by Cloudfare security researcher Justin Paine, who found out that VOIPo’s data was available…
Read more