2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: network segmentation

IT Services & IT Solutions Mississauga & Toronto

Network Hacks Increase With Work-from-Home Adoption

Arctic Security, a Finnish Cybersecurity company, has recently conducted a study about the impact of Work-from-Home on the number of Network Cybersecurity Incidents in Finland. It was discovered that Finland usually sees around 200 network compromises per week. However, the country saw an increase to 800 incidents during the 3rd week of March. It was…
Read more

cloud security 2020 cybersecurity focus

Cloud Security Will Be The Cybersecurity Topic Of 2020

Cloud computing grew drastically in 2019. However, cloud security has dragged behind in development which has resulted in some of the most devastating cyberattacks in history. In traditional offline computing, programs and data are stored locally on a machine. On the organizational scale, data may be stored and shared on local servers that are linked…
Read more
bluekeep exploits patch to protect cybersecurity

Microsoft Urges Users To Patch Windows To Defend Against BlueKeep Exploits

To protect yourself from ongoing BlueKeep exploit attacks, Microsoft urges users with systems running Windows 7, Windows Server 2008, and Windows Server 2008 R2 to update their operating systems. BlueKeep is a vulnerability with the ‘worm’ capability. This means that the malware can spread itself to other vulnerable computers on the network without additional input…
Read more
Prnter_iot_device

Cyberattackers Are Targeting IOT Devices: How Do You Defend Yourself?

A new threat group, called “STRONTIUM”, was recently discovered by the Microsoft Threat Intelligence Center (MSTIC). In April 2019, this cyberthreat infiltrated private company networks through 3 different IoT devices – a VoIP phone, printer, and video decoder. The Microsoft researchers reported that the devices were compromised as a result of the devices running out-of-date…
Read more

bankrupt_smaller

Debt-Collector Firm Files For Bankruptcy Following Data Breach Costing Millions

New York-based debt collection company Retrieval-Masters Creditors Bureau, Inc. has filed for bankruptcy due to a massive data breach. Following the leak, the legal obligation on the company to notify the 7 million affected by the data breach cost it $3.8 million. Another $400 000 was also spent on external IT consultants to determine the…
Read more

Watch Out! Supply Chain Attacks are on the Rise

In a recent report, Microsoft has stated that supply chain attacks have become an increasingly pressing concern for cybersecurity professionals. What are Supply Chain Attacks? Computer software is constantly updated by developers. These are released to the public through cycles of patches. A supply Chain Attack is a type of cyberattack that infiltrates a victim’s…
Read more
cybersecurity code hacker

Ransomware has been Ravaging Canadian Towns: How Can You Protect Yourself?

The Canadian Ransomware Incidents The town of Midland Canada has recently been ravaged by the aftermath of a ransomware attack. Ransomware is a type of malicious cyberattack that locks sensitive data on your computer behind ransom-walls. Attackers then demand payment in the form of physical or digital currency for the safe release of this information.…
Read more

Network Separation: Is it an Impenetrable Security Measure?

A major malware attack against Singapore’s Health Service sector has motivated the Singaporean Government to adopt a new strategy for protecting these systems from future cyber threats. The security measure that will be employed is called “Network Separation”, and involves completely disconnecting computers from the internet.   The Cyberattack on SingHealth SingHealth, short for Singapore…
Read more
Ransomware Protection

Make your Business Safe From Ransomware Attack

3 Preventive Measures To Make your Business Safe From Ransomware Attack What is a Ransomware? A ransomware is a malicious software, that encrypts computer files preventing users to access their files or that threatens to publish the victim's data and asks for ransom payment to not publish the data or decrypt or unlock the files…
Read more