2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: IT services

IT Services & IT Solutions Mississauga & Toronto

Increase in Cyberattacks Targeting Cloud Applications

COVID-19 has caused many businesses to adopt cloud applications to keep up company productivity. Cloud applications are programs and digital tools that are hosted in the internet and allow for easy collaborative workflows and communication. A prime example of a cloud application is Microsoft’s Office 365 suite. It brings the well-known Office applications such as…
Read more

trojan malware

The Emotet Trojan Malware Is Spreading Through Wifi

The Trojan malware strain known as Emotet has been in circulation ever since 2014. Early versions of the malware aimed to steal sensitive information or credentials after infecting victims’ computers. Up until recently, it was believed that the only way that Emotet trojan could infect a computer was through malicious email links. However, it was…
Read more

cloud security 2020 cybersecurity focus

Cloud Security Will Be The Cybersecurity Topic Of 2020

Cloud computing grew drastically in 2019. However, cloud security has dragged behind in development which has resulted in some of the most devastating cyberattacks in history. In traditional offline computing, programs and data are stored locally on a machine. On the organizational scale, data may be stored and shared on local servers that are linked…
Read more
ransomware in 2020 cybersecurity landscape new year

Ransomware In 2020 Will Be More Vicious Than Ever

With 2019 drawing to a close and 2020 almost here, we can take a look sat how the cybersecurity landscape has evolved over this past year. By far the two most prevalent topics of the year have been ransomware and data privacy. Ransomware By far the most relevant cybersecurity threat of 2019 was the rise…
Read more
coding

A Windows BlueKeep Exploit Is Now Commercially Available

Immunity Inc., an IT security consulting company, announced that a BlueKeep Exploit will now be included in CANVAS – the company’s commercially available security penetration-testing tool. BlueKeep is a security vulnerability that affects Windows 7, Windows 2003, Windows XP, Windows Server 2008 R2, and Windows Server 2008. Also known as CVE-2019-0708, the flaw allows attackers…
Read more
code hacking ransomware attack

How do Cyberattackers Exploit your own Programs?

Due to major strides in cybersecurity protection in the past few years, cyberattackers have needed to find alternate methods of infiltrating victims’ computers. One strategy that has seen a recent increase is the exploitation of programs that already exist on victims’ computers - a strategy called “Living off the Land”. IBM has stated that over…
Read more

Why you should avoid SMBv1 in 2019

A server computer acts as a central hub to any organization’s IT infrastructure. It is the core that all other computers are connected to, and stores and shares information among them. Much like personal computers, servers rely on operating systems and programs to carry out their functions. One of such software, called SMBv1, has been…
Read more

Reporting Data Breaches: Do you need to do it?

Hong Kong’s flag carrier, Cathay Pacific, has been the latest in the long list of companies affected by major digital data breaches. It was reported that the sensitive data of over 9.4 million customers were compromised due to the incident. Over 400 expired credit card numbers, and 27 active cards (without CVV information) were leaked.…
Read more
boss-3385070_960_720

How do you protect yourself against CEO Fraud?

CEO Fraud, or Business E-Mail Compromise (BEC), is an e-mail scam that aims to trick business employees into transferring money or sending sensitive information to a fraudulent account. In a recent study conducted by the Internet Crime Complaint Centre, it was found that these email scams have resulted in financial damages of more than $5…
Read more

How to Protect Yourself from the Struts Vulnerability

It has recently been discovered that a vulnerability in Apache Struts may have left many organizations open to cyberattack. Struts is an application used by many companies to create their web based programs. The vulnerability, which was discovered by Semmle researcher Man Yue Mo allows for cyberattackers to gain access to a corporate network through…
Read more