2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: internet security

IT Services & IT Solutions Mississauga & Toronto

cyber-security-1805246_960_720

106 Million Affected By Capital One Data Breach

In one of the largest financial data theft incidents in history, Capital One Financial Corporation reported on July 19th 2019 that around 106 million of its clients’ data was leaked due to cyberattack. Of the affected, 100 million are located in the U.S. and 6 million in Canada. Capital One announced that personal client information…
Read more
coding

A Windows BlueKeep Exploit Is Now Commercially Available

Immunity Inc., an IT security consulting company, announced that a BlueKeep Exploit will now be included in CANVAS – the company’s commercially available security penetration-testing tool. BlueKeep is a security vulnerability that affects Windows 7, Windows 2003, Windows XP, Windows Server 2008 R2, and Windows Server 2008. Also known as CVE-2019-0708, the flaw allows attackers…
Read more

Watch Out! Supply Chain Attacks are on the Rise

In a recent report, Microsoft has stated that supply chain attacks have become an increasingly pressing concern for cybersecurity professionals. What are Supply Chain Attacks? Computer software is constantly updated by developers. These are released to the public through cycles of patches. A supply Chain Attack is a type of cyberattack that infiltrates a victim’s…
Read more

Protecting yourself against Cryptojacking

A cryptojacking attack has forced St. Francis Xavier University to temporarily shut down its computer network systems. The university reports that the cyberattackers attempted to use the school’s computers resources to collect digital currency. What are cryptomining and cryptojacking? Cryptomining is the use of computer resources to collect cryptocurrencies such as bitcoin. The act of…
Read more
computer-3028682_960_720

Phishing Scams: what are they, and how do you protect yourself?

Phishing scams are a type of cyberattack that is designed to steal sensitive data such as login credentials and credit card information. The term ‘phishing’ originates from the word ‘fishing’, due to the cyberattack strategy using ‘baits’ to lure out victims. Often, phishing scams will be distributed through fraudulent email addresses that direct users to…
Read more
data protection and regulation GDPR policies

How to Prepare for the Upcoming Data Privacy Act

The Canadian government has set November 1st as the official date that the new Digital Privacy Act will be implemented. On this day, all private Canadian organizations will need to ensure that they have adhered to the rules defined by this new act. The document outlines regulations regarding the protocols of handling data breaches –…
Read more
cybersecurity code hacker

Ransomware has been Ravaging Canadian Towns: How Can You Protect Yourself?

The Canadian Ransomware Incidents The town of Midland Canada has recently been ravaged by the aftermath of a ransomware attack. Ransomware is a type of malicious cyberattack that locks sensitive data on your computer behind ransom-walls. Attackers then demand payment in the form of physical or digital currency for the safe release of this information.…
Read more
network-3664100_960_720

6 Critical Practices that improve your Company Cybersecurity

Company cybersecurity should be of upmost importance to any organization. Protecting sensitive data and client information is essential to building customer trust. A recent report conducted by the Centre for Internet Security (CIS) has found that many of today’s companies are neglecting simple cybersecurity practices. In the study, named “State of Cyber Hygiene Report”, over…
Read more
boss-3385070_960_720

How do you protect yourself against CEO Fraud?

CEO Fraud, or Business E-Mail Compromise (BEC), is an e-mail scam that aims to trick business employees into transferring money or sending sensitive information to a fraudulent account. In a recent study conducted by the Internet Crime Complaint Centre, it was found that these email scams have resulted in financial damages of more than $5…
Read more

Are your organization’s fax machines security vulnerabilities?

It has recently been discovered by Check Point researchers that fax machines contain cyber-vulnerabilities that allow attackers to infiltrate your network using only a fax number. Given that many companies today still use fax machines, and that fax numbers are publicly provided contact information, this new exploit poses a major vulnerability concern to thousands of…
Read more