2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: managed it security

IT Services & IT Solutions Mississauga & Toronto

ssh keys

SSH Key Malware Is Spreading

What are SSH Keys? SSH, or Secure Shell, is a method used to establish a secure login between two systems. It is widely used across many operating systems. Using an SSH key, an IT administrators can gain access to servers and computers. Because SSH keys do not expire, and unauthorized individual in possession of and…
Read more

insurance company calculator

Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack

On October 8th 2019, an unnamed Canadian insurance company paid a total of 950 000 USD to a ransomware cyberattacker. The attacker was able to infect 20 servers and around 1000 employee computers in the attack, encrypting data on the systems behind a ransomwall, demanding payment of 109.25 bitcoins for the safe release of the…
Read more
travelex sodinokibi ransomware attack foreign exchange company

Travelex falls victim to “Sodinokibi” Ransomware

The list of ransomware victims continues to grow. On New Year’s Eve 2020, Travelex, an international foreign exchange company, disclosed that it was struck by the “Sodinokibi” ransomware strain. Also known as REvil, Sodinokibi ransomware prevents users from accessing their computer data by encrypting it behind a ransomwall. The ransom demand for Travelex was $6M…
Read more
technology icon gallery

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more
fileless_malware_image

Fileless Malware is Difficult to Detect, Dangerous, and On-The-Rise

Fileless Malware Attacks are on the rise. The Canadian Centre for Cyber Security warns the public to watch out for this dangerous type of cyberattack. Fileless malware attacks are a particularly dangerous strain of malicious software (malware) that are difficult to detect due to their ability to exploit your own programs to mask themselves. This…
Read more
scam_phishing_small

Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting

Multinational insurance company CFC Underwriting says that human error still remains a primary factor in the thousands of cybersecurity insurance claims that the company handles. In 2018, the insurance company received over a thousand claims relating to ransomware, malware, data breaches, and data theft. Of these incidents, CFC Underwriting notes that the following human-driven errors…
Read more
ransomware thumbnail email malicious

Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption

The list of ransomware victims continues to grow. Florida’s Lake City and Riviera Beach City have both fallen victim to cyberattack. Both cities have been forced to pay $500 000 each to the attackers in attempts to unlock the encrypted files. On June 5th, the City of Riviera Beach released an official announcement stating that…
Read more
bankrupt_smaller

Debt-Collector Firm Files For Bankruptcy Following Data Breach Costing Millions

New York-based debt collection company Retrieval-Masters Creditors Bureau, Inc. has filed for bankruptcy due to a massive data breach. Following the leak, the legal obligation on the company to notify the 7 million affected by the data breach cost it $3.8 million. Another $400 000 was also spent on external IT consultants to determine the…
Read more

Reporting Data Breaches: Do you need to do it?

Hong Kong’s flag carrier, Cathay Pacific, has been the latest in the long list of companies affected by major digital data breaches. It was reported that the sensitive data of over 9.4 million customers were compromised due to the incident. Over 400 expired credit card numbers, and 27 active cards (without CVV information) were leaked.…
Read more

Are your organization’s fax machines security vulnerabilities?

It has recently been discovered by Check Point researchers that fax machines contain cyber-vulnerabilities that allow attackers to infiltrate your network using only a fax number. Given that many companies today still use fax machines, and that fax numbers are publicly provided contact information, this new exploit poses a major vulnerability concern to thousands of…
Read more