2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: internet security

IT Services & IT Solutions Mississauga & Toronto

covid 19 healthcare

Cyberattackers Are Targeting Organizations Aiding In Covid-19 Response

It has recently been discovered that cyberattacker threats are targeting organizations involved in the global Covid-19 response, according to the UK’s National Cybersecurity Centre and US’ Cybersecurity and Infrastructure Security Agency. Industries that are being targeted include healthcare, academic institutions, medical organizations, and pharmaceuticals. It was discovered that APTs, or Advanced Persisted Threat groups, pose…
Read more

ssh keys

SSH Key Malware Is Spreading

What are SSH Keys? SSH, or Secure Shell, is a method used to establish a secure login between two systems. It is widely used across many operating systems. Using an SSH key, an IT administrators can gain access to servers and computers. Because SSH keys do not expire, and unauthorized individual in possession of and…
Read more

insurance company calculator

Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack

On October 8th 2019, an unnamed Canadian insurance company paid a total of 950 000 USD to a ransomware cyberattacker. The attacker was able to infect 20 servers and around 1000 employee computers in the attack, encrypting data on the systems behind a ransomwall, demanding payment of 109.25 bitcoins for the safe release of the…
Read more
Windows 7 end of life time to update to windows 10

Today We Say Goodbye to Windows 7

Goodbye Windows 7 - today, January 14th 2020, is the day that Microsoft officially ends security support for Windows 7 computers. This means that PCs still running the decade old operating system will no longer be receiving security updates from Microsoft. According to NetMarketShare's statistics, 1/3 of PCs around the world are still running Windows…
Read more
ransomware in 2020 cybersecurity landscape new year

Ransomware In 2020 Will Be More Vicious Than Ever

With 2019 drawing to a close and 2020 almost here, we can take a look sat how the cybersecurity landscape has evolved over this past year. By far the two most prevalent topics of the year have been ransomware and data privacy. Ransomware By far the most relevant cybersecurity threat of 2019 was the rise…
Read more
european airport infected with malware

European Airport Finds 50% of its Computers Infected With Malware

50% of the workstations at an international airport in Europe have been infected by a cryptomining malware. The breach was discovered by researchers from cybersecurity company Cyberbit. The researchers stated that they detected the malware due to abnormal activity of the PAExec tool and Reflective DLL Loading on the infected computers. What is cryptojacking? Cryptojacking…
Read more

What Is Malware and How Can You Stop It?

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls. There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user…
Read more
technology icon gallery

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more
ransomware security keyboard

22 Governments in Texas Hit By First Coordinated Ransomware Attack

On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments. While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According…
Read more

Prnter_iot_device

Cyberattackers Are Targeting IOT Devices: How Do You Defend Yourself?

A new threat group, called “STRONTIUM”, was recently discovered by the Microsoft Threat Intelligence Center (MSTIC). In April 2019, this cyberthreat infiltrated private company networks through 3 different IoT devices – a VoIP phone, printer, and video decoder. The Microsoft researchers reported that the devices were compromised as a result of the devices running out-of-date…
Read more