2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: managed IT services

IT Services & IT Solutions Mississauga & Toronto

ransomware new strategy release stolen data

Ransomware Cyberattackers Now Releasing Stolen Data To The Public

Cyberattackers using ransomware for money extortion have recently adopted a new strategy to force victims into succumbing to their threats – releasing sensitive stolen information to the public. This new strategy was brought to light by a recent cyberattack by the Maze Ransomware strain. Typically, ransomware cyberattacks force victims to pay ransom fees by locking…
Read more

What Is Malware and How Can You Stop It?

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls. There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user…
Read more
technology icon gallery

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more
bankrupt_smaller

Debt-Collector Firm Files For Bankruptcy Following Data Breach Costing Millions

New York-based debt collection company Retrieval-Masters Creditors Bureau, Inc. has filed for bankruptcy due to a massive data breach. Following the leak, the legal obligation on the company to notify the 7 million affected by the data breach cost it $3.8 million. Another $400 000 was also spent on external IT consultants to determine the…
Read more

Cybersecurity graphic

IT Services Company HCL Suffers Data-Leak, Quickly Recovers

HCL, a multibillion dollar company with over 100 000 employees, has suffered a data leak of sensitive customer and employee information. The leak was discovered on May 1st 2019 by a research team in UpGuard. Information that was leaked included employee information, customer information, and company project details. For employees of the company, names, IDs,…
Read more

code hacking ransomware attack

How do Cyberattackers Exploit your own Programs?

Due to major strides in cybersecurity protection in the past few years, cyberattackers have needed to find alternate methods of infiltrating victims’ computers. One strategy that has seen a recent increase is the exploitation of programs that already exist on victims’ computers - a strategy called “Living off the Land”. IBM has stated that over…
Read more
computer-3028682_960_720

Phishing Scams: what are they, and how do you protect yourself?

Phishing scams are a type of cyberattack that is designed to steal sensitive data such as login credentials and credit card information. The term ‘phishing’ originates from the word ‘fishing’, due to the cyberattack strategy using ‘baits’ to lure out victims. Often, phishing scams will be distributed through fraudulent email addresses that direct users to…
Read more
boss-3385070_960_720

How do you protect yourself against CEO Fraud?

CEO Fraud, or Business E-Mail Compromise (BEC), is an e-mail scam that aims to trick business employees into transferring money or sending sensitive information to a fraudulent account. In a recent study conducted by the Internet Crime Complaint Centre, it was found that these email scams have resulted in financial damages of more than $5…
Read more

Why Zero Day Recovery is Essential to your Company’s Security

The Zero-Day-Recovery Cybersecurity Strategy One of the most immediate and adverse effects of a malware attack is the potential for the affected company to come to a complete productive halt. This is the case for all sorts of malware ranging from data-stealing Trojans to data-locking ransomware. Every moment that a company spends offline to deal…
Read more