2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: network security

IT Services & IT Solutions Mississauga & Toronto

Employees Maliciously Cause Data Breaches at American Express and Yahoo

In two separate incidents, U.S. companies American Express and Yahoo have both been affected by data breaches of their clients’ personal information. Both attacks were the result of insider threats – a type of cyberattack caused by an internal person in the company. The American Express Incident American Express stated that data that was leaked…
Read more

VPN Devices Need Patching: New Vulnerabilities Have Been Discovered

The Canadian Centre for Cybersecurity recently stressed the importance of keeping VPN devices up-to-date. Because VPN devices act as points of contact between a network and the internet, they are particularly vulnerable to cyberattack. The Centre for Cybersecurity identified four types of VPN that are particularly vulnerable: Fortinet Forigate, Palo Alto GlobalProtect, Pulse Connect Secure,…
Read more

106 Million Affected By Capital One Data Breach

In one of the largest financial data theft incidents in history, Capital One Financial Corporation reported on July 19th 2019 that around 106 million of its clients’ data was leaked due to cyberattack. Of the affected, 100 million are located in the U.S. and 6 million in Canada. Capital One announced that personal client information…
Read more

Watch Out! Supply Chain Attacks are on the Rise

In a recent report, Microsoft has stated that supply chain attacks have become an increasingly pressing concern for cybersecurity professionals. What are Supply Chain Attacks? Computer software is constantly updated by developers. These are released to the public through cycles of patches. A supply Chain Attack is a type of cyberattack that infiltrates a victim’s…
Read more

Protecting yourself against Cryptojacking

A cryptojacking attack has forced St. Francis Xavier University to temporarily shut down its computer network systems. The university reports that the cyberattackers attempted to use the school’s computers resources to collect digital currency. What are cryptomining and cryptojacking? Cryptomining is the use of computer resources to collect cryptocurrencies such as bitcoin. The act of…
Read more

How to Prepare for the Upcoming Data Privacy Act

The Canadian government has set November 1st as the official date that the new Digital Privacy Act will be implemented. On this day, all private Canadian organizations will need to ensure that they have adhered to the rules defined by this new act. The document outlines regulations regarding the protocols of handling data breaches –…
Read more

Ransomware has been Ravaging Canadian Towns: How Can You Protect Yourself?

The Canadian Ransomware Incidents The town of Midland Canada has recently been ravaged by the aftermath of a ransomware attack. Ransomware is a type of malicious cyberattack that locks sensitive data on your computer behind ransom-walls. Attackers then demand payment in the form of physical or digital currency for the safe release of this information.…
Read more

6 Critical Practices that improve your Company Cybersecurity

Company cybersecurity should be of upmost importance to any organization. Protecting sensitive data and client information is essential to building customer trust. A recent report conducted by the Centre for Internet Security (CIS) has found that many of today’s companies are neglecting simple cybersecurity practices. In the study, named “State of Cyber Hygiene Report”, over…
Read more

How do you protect yourself against CEO Fraud?

CEO Fraud, or Business E-Mail Compromise (BEC), is an e-mail scam that aims to trick business employees into transferring money or sending sensitive information to a fraudulent account. In a recent study conducted by the Internet Crime Complaint Centre, it was found that these email scams have resulted in financial damages of more than $5…
Read more

How to Protect Yourself from the Struts Vulnerability

It has recently been discovered that a vulnerability in Apache Struts may have left many organizations open to cyberattack. Struts is an application used by many companies to create their web based programs. The vulnerability, which was discovered by Semmle researcher Man Yue Mo allows for cyberattackers to gain access to a corporate network through…
Read more