2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: data breach

IT Services & IT Solutions Mississauga & Toronto

european airport infected with malware

European Airport Finds 50% of its Computers Infected With Malware

50% of the workstations at an international airport in Europe have been infected by a cryptomining malware. The breach was discovered by researchers from cybersecurity company Cyberbit. The researchers stated that they detected the malware due to abnormal activity of the PAExec tool and Reflective DLL Loading on the infected computers. What is cryptojacking? Cryptojacking…
Read more
businessman internal employee data breach

Employees Maliciously Cause Data Breaches at American Express and Yahoo

In two separate incidents, U.S. companies American Express and Yahoo have both been affected by data breaches of their clients’ personal information. Both attacks were the result of insider threats – a type of cyberattack caused by an internal person in the company. The American Express Incident American Express stated that data that was leaked…
Read more

What Is Malware and How Can You Stop It?

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls. There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user…
Read more
work-731198_960_720

3rd Party Programs: Are They Cybersecurity Weakpoints?

Almost 400 dental offices were infected with ransomware in a cyberattack this August. The computers became infected after DDS Safe, a 3rd party cloud backup software that all the affected offices were using, was compromised. The software was developed by Dental Technology Company PerCSoft. Affected offices had their computer files encrypted behind ransomwalls. On August…
Read more
coding

A Windows BlueKeep Exploit Is Now Commercially Available

Immunity Inc., an IT security consulting company, announced that a BlueKeep Exploit will now be included in CANVAS – the company’s commercially available security penetration-testing tool. BlueKeep is a security vulnerability that affects Windows 7, Windows 2003, Windows XP, Windows Server 2008 R2, and Windows Server 2008. Also known as CVE-2019-0708, the flaw allows attackers…
Read more

Protecting yourself against Cryptojacking

A cryptojacking attack has forced St. Francis Xavier University to temporarily shut down its computer network systems. The university reports that the cyberattackers attempted to use the school’s computers resources to collect digital currency. What are cryptomining and cryptojacking? Cryptomining is the use of computer resources to collect cryptocurrencies such as bitcoin. The act of…
Read more

Reporting Data Breaches: Do you need to do it?

Hong Kong’s flag carrier, Cathay Pacific, has been the latest in the long list of companies affected by major digital data breaches. It was reported that the sensitive data of over 9.4 million customers were compromised due to the incident. Over 400 expired credit card numbers, and 27 active cards (without CVV information) were leaked.…
Read more
data protection and regulation GDPR policies

How to Prepare for the Upcoming Data Privacy Act

The Canadian government has set November 1st as the official date that the new Digital Privacy Act will be implemented. On this day, all private Canadian organizations will need to ensure that they have adhered to the rules defined by this new act. The document outlines regulations regarding the protocols of handling data breaches –…
Read more

Four Essential GDPR Requirements To Consider

Four Essential GDPR Requirements To Consider A survey carried out by the ISACA found that a mere 29% of companies worldwide will be prepared for the compliance deadline of new the GDPR requirements, which will be implemented on May 25th 2018. The new regulation outlines requirements for businesses in order to protect the personal information…
Read more
Cloud Data Security

Importance of Cloud Data Security

Importance of Cloud Data Security Since 2015 there has been a remarkable increase in the use of cloud based solutions, such as cloud backup, email, project management tools and virtual desktops. In a study conducted by Ponemon Institute, they found on an average modern days businesses are using 27 cloud based applications. - 2018 Global…
Read more