2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: managed security services

IT Services & IT Solutions Mississauga & Toronto

resort

10.6 Million Customer Records Leaked by MGM Resorts

Over 10.6 million customer data records were leaked by the MGM Resorts Hotel in a recent data breach. Information that was leaked to the public included customer addresses, phone numbers, birthdays, and email addresses. The information was posted publicly on a hacking forum. In the post-leak security audit, MGM discovered that the breach was caused…
Read more

cloud security 2020 cybersecurity focus

Cloud Security Will Be The Cybersecurity Topic Of 2020

Cloud computing grew drastically in 2019. However, cloud security has dragged behind in development which has resulted in some of the most devastating cyberattacks in history. In traditional offline computing, programs and data are stored locally on a machine. On the organizational scale, data may be stored and shared on local servers that are linked…
Read more
work-731198_960_720

3rd Party Programs: Are They Cybersecurity Weakpoints?

Almost 400 dental offices were infected with ransomware in a cyberattack this August. The computers became infected after DDS Safe, a 3rd party cloud backup software that all the affected offices were using, was compromised. The software was developed by Dental Technology Company PerCSoft. Affected offices had their computer files encrypted behind ransomwalls. On August…
Read more
ransomware security keyboard

22 Governments in Texas Hit By First Coordinated Ransomware Attack

On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments. While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According…
Read more

Prnter_iot_device

Cyberattackers Are Targeting IOT Devices: How Do You Defend Yourself?

A new threat group, called “STRONTIUM”, was recently discovered by the Microsoft Threat Intelligence Center (MSTIC). In April 2019, this cyberthreat infiltrated private company networks through 3 different IoT devices – a VoIP phone, printer, and video decoder. The Microsoft researchers reported that the devices were compromised as a result of the devices running out-of-date…
Read more

fileless_malware_image

Fileless Malware is Difficult to Detect, Dangerous, and On-The-Rise

Fileless Malware Attacks are on the rise. The Canadian Centre for Cyber Security warns the public to watch out for this dangerous type of cyberattack. Fileless malware attacks are a particularly dangerous strain of malicious software (malware) that are difficult to detect due to their ability to exploit your own programs to mask themselves. This…
Read more

Watch Out! Supply Chain Attacks are on the Rise

In a recent report, Microsoft has stated that supply chain attacks have become an increasingly pressing concern for cybersecurity professionals. What are Supply Chain Attacks? Computer software is constantly updated by developers. These are released to the public through cycles of patches. A supply Chain Attack is a type of cyberattack that infiltrates a victim’s…
Read more

Why are Cyberattackers Targetting Loyalty Programs?

Cyberattackers have recently taken an interest in hacking company loyalty programs. This was illustrated by a recent data breach in Marriott, which affected over 500 million customers. The guests that were affected were a part of the organization’s Starwood Preferred Guest loyalty program, which is a joint program by Marriott and Starwood Hotels and Resorts.…
Read more