2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: IT solutions

IT Services & IT Solutions Mississauga & Toronto

Increase in Cyberattacks Targeting Cloud Applications

COVID-19 has caused many businesses to adopt cloud applications to keep up company productivity. Cloud applications are programs and digital tools that are hosted in the internet and allow for easy collaborative workflows and communication. A prime example of a cloud application is Microsoft’s Office 365 suite. It brings the well-known Office applications such as…
Read more

trojan malware

The Emotet Trojan Malware Is Spreading Through Wifi

The Trojan malware strain known as Emotet has been in circulation ever since 2014. Early versions of the malware aimed to steal sensitive information or credentials after infecting victims’ computers. Up until recently, it was believed that the only way that Emotet trojan could infect a computer was through malicious email links. However, it was…
Read more

hacking coding dangerous software vulnerabilities to be patched

The Most Dangerous Software Errors Have Been Identified

American Not-for-profit research organization MITRE has published their 2019 report for the “Top 25 Most Dangerous Software Errors”. In their report, MITRE placed buffer flaws and cross-site scripting at the top of their list. The CWE list of top 25 most dangerous software errors is a useful reference for software developers and cybersecurity professionals when…
Read more
Cybersecurity graphic

IT Services Company HCL Suffers Data-Leak, Quickly Recovers

HCL, a multibillion dollar company with over 100 000 employees, has suffered a data leak of sensitive customer and employee information. The leak was discovered on May 1st 2019 by a research team in UpGuard. Information that was leaked included employee information, customer information, and company project details. For employees of the company, names, IDs,…
Read more

data protection and regulation GDPR policies

How to Prepare for the Upcoming Data Privacy Act

The Canadian government has set November 1st as the official date that the new Digital Privacy Act will be implemented. On this day, all private Canadian organizations will need to ensure that they have adhered to the rules defined by this new act. The document outlines regulations regarding the protocols of handling data breaches –…
Read more

Why Protecting Your Server is Critical to your Company’s Cybersecurity

A server is a computer that is connected to other systems in a company through either the internet or a local network, and that dedicates its resources to ‘serving’ these computers. Because of this, servers are in constant communication with all company systems, storing, processing, and communicating data. Due to the fact that they are…
Read more

The Rise of Cryptojackers: What It Is and Symptoms To Look For

Increase in Mining Popularity Crypto-currency mining saw a massive increase in popularity in Q4 2017 due to spikes digital currency value. During this time, the value of the “Bitcoin” currency was at an all-time-high, at nearly $20 000 per coin. Other currencies such as Monero also saw increase in value. While their financial worth has…
Read more

Why Is Patching So Important For Cybersecurity?

The Importance of Software Updates for Protection One of the simplest yet most critical steps in protecting your computers from cyber threats is ensuring that they are patching the latest updates from developers. Microsoft has reported that only 1/3 of Windows 10 computers have applied the update that they released on April 30th 2018. This…
Read more

Four Essential GDPR Requirements To Consider

Four Essential GDPR Requirements To Consider A survey carried out by the ISACA found that a mere 29% of companies worldwide will be prepared for the compliance deadline of new the GDPR requirements, which will be implemented on May 25th 2018. The new regulation outlines requirements for businesses in order to protect the personal information…
Read more