2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: IT infrastructure

IT Services & IT Solutions Mississauga & Toronto

Cybersecurity graphic

IT Services Company HCL Suffers Data-Leak, Quickly Recovers

HCL, a multibillion dollar company with over 100 000 employees, has suffered a data leak of sensitive customer and employee information. The leak was discovered on May 1st 2019 by a research team in UpGuard. Information that was leaked included employee information, customer information, and company project details. For employees of the company, names, IDs,…
Read more

Why you should avoid SMBv1 in 2019

A server computer acts as a central hub to any organization’s IT infrastructure. It is the core that all other computers are connected to, and stores and shares information among them. Much like personal computers, servers rely on operating systems and programs to carry out their functions. One of such software, called SMBv1, has been…
Read more

Protecting yourself against Cryptojacking

A cryptojacking attack has forced St. Francis Xavier University to temporarily shut down its computer network systems. The university reports that the cyberattackers attempted to use the school’s computers resources to collect digital currency. What are cryptomining and cryptojacking? Cryptomining is the use of computer resources to collect cryptocurrencies such as bitcoin. The act of…
Read more

Reporting Data Breaches: Do you need to do it?

Hong Kong’s flag carrier, Cathay Pacific, has been the latest in the long list of companies affected by major digital data breaches. It was reported that the sensitive data of over 9.4 million customers were compromised due to the incident. Over 400 expired credit card numbers, and 27 active cards (without CVV information) were leaked.…
Read more

Are your organization’s fax machines security vulnerabilities?

It has recently been discovered by Check Point researchers that fax machines contain cyber-vulnerabilities that allow attackers to infiltrate your network using only a fax number. Given that many companies today still use fax machines, and that fax numbers are publicly provided contact information, this new exploit poses a major vulnerability concern to thousands of…
Read more

This is why WannaCry is still a threat

The WannaCry malware saw its peak infections on May 12th 2017, during which 300 000 computers across 150 countries were affected. This piece of malicious software locks computer data behind ransomwalls and demands Bitcoin payments for the release of this information. However payment of this ransom does not even guarantee the safe release of the…
Read more

Why Zero Day Recovery is Essential to your Company’s Security

The Zero-Day-Recovery Cybersecurity Strategy One of the most immediate and adverse effects of a malware attack is the potential for the affected company to come to a complete productive halt. This is the case for all sorts of malware ranging from data-stealing Trojans to data-locking ransomware. Every moment that a company spends offline to deal…
Read more
Office IT Support

Office IT Support

Office IT Support Reliable Office IT Support in Toronto Choose gigE office IT services to help you achieve your business goals, remain competitive and improve your service delivery. Your business is built on IT infrastructure. Having the right people to design, install and maintain the IT systems you use on a daily basis is critical…
Read more

I.T. infrastructure Key Terms

    BACK   Backup Policy A schedule of backup procedures which are set in place to ensure efficient data recovery in case of data failure   Company Disk Volumes The storage capacity that an organization has to store its information   Device Racking The physical setup of server systems on their shelves   Hardware…
Read more

What is I.T. Infrastructure?

      BACK   GIGE IT Solutions offers our network experts to help you design and deploy IT infrastructure to help your company succeed in its respective industry. I.T. infrastructure encompasses all technical systems that a company uses on a daily basis. It includes frameworks such as servers, employee workstations, e-mail systems, and security.…
Read more