2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: gige it solutions

IT Services & IT Solutions Mississauga & Toronto

scam_phishing_small

Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting

Multinational insurance company CFC Underwriting says that human error still remains a primary factor in the thousands of cybersecurity insurance claims that the company handles. In 2018, the insurance company received over a thousand claims relating to ransomware, malware, data breaches, and data theft. Of these incidents, CFC Underwriting notes that the following human-driven errors…
Read more
ransomware thumbnail email malicious

Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption

The list of ransomware victims continues to grow. Florida’s Lake City and Riviera Beach City have both fallen victim to cyberattack. Both cities have been forced to pay $500 000 each to the attackers in attempts to unlock the encrypted files. On June 5th, the City of Riviera Beach released an official announcement stating that…
Read more
bankrupt_smaller

Debt-Collector Firm Files For Bankruptcy Following Data Breach Costing Millions

New York-based debt collection company Retrieval-Masters Creditors Bureau, Inc. has filed for bankruptcy due to a massive data breach. Following the leak, the legal obligation on the company to notify the 7 million affected by the data breach cost it $3.8 million. Another $400 000 was also spent on external IT consultants to determine the…
Read more

Watch Out! Supply Chain Attacks are on the Rise

In a recent report, Microsoft has stated that supply chain attacks have become an increasingly pressing concern for cybersecurity professionals. What are Supply Chain Attacks? Computer software is constantly updated by developers. These are released to the public through cycles of patches. A supply Chain Attack is a type of cyberattack that infiltrates a victim’s…
Read more
code hacking ransomware attack

How do Cyberattackers Exploit your own Programs?

Due to major strides in cybersecurity protection in the past few years, cyberattackers have needed to find alternate methods of infiltrating victims’ computers. One strategy that has seen a recent increase is the exploitation of programs that already exist on victims’ computers - a strategy called “Living off the Land”. IBM has stated that over…
Read more

Why you should avoid SMBv1 in 2019

A server computer acts as a central hub to any organization’s IT infrastructure. It is the core that all other computers are connected to, and stores and shares information among them. Much like personal computers, servers rely on operating systems and programs to carry out their functions. One of such software, called SMBv1, has been…
Read more

Data Exposure: How do you avoid it?

The first major data exposure of 2019 has occurred. VOIPo, a Voice-Over-IP service provider based in California, accidentally publicized its databases, leading to almost 7 million VOIP call logs, message logs, and other sensitive information being leaked. The leak was discovered by Cloudfare security researcher Justin Paine, who found out that VOIPo’s data was available…
Read more

Why are Cyberattackers Targetting Loyalty Programs?

Cyberattackers have recently taken an interest in hacking company loyalty programs. This was illustrated by a recent data breach in Marriott, which affected over 500 million customers. The guests that were affected were a part of the organization’s Starwood Preferred Guest loyalty program, which is a joint program by Marriott and Starwood Hotels and Resorts.…
Read more

Microsoft 365 Multifactor Authentication Crash Locks Users Out

Multifactor authentication is a layer of IT security meant to prevent cyberattackers from being able to access your accounts. It does this by sending one-time use codes to users’ phones every time they log in from an unfamiliar device. Therefore, even if an attacker has your password, they will not be able to access your…
Read more

Protecting yourself against Cryptojacking

A cryptojacking attack has forced St. Francis Xavier University to temporarily shut down its computer network systems. The university reports that the cyberattackers attempted to use the school’s computers resources to collect digital currency. What are cryptomining and cryptojacking? Cryptomining is the use of computer resources to collect cryptocurrencies such as bitcoin. The act of…
Read more