2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: networking solutions

IT Services & IT Solutions Mississauga & Toronto

Network Hacks Increase With Work-from-Home Adoption

Arctic Security, a Finnish Cybersecurity company, has recently conducted a study about the impact of Work-from-Home on the number of Network Cybersecurity Incidents in Finland. It was discovered that Finland usually sees around 200 network compromises per week. However, the country saw an increase to 800 incidents during the 3rd week of March. It was…
Read more

cathay pacific cyberattack

Lessons Learned From The Cathay Pacific Data Breach

Hong Kong airline company Cathay Pacific was fined 500 000 pounds by the UK Information Commissioner’s office due to a data leak where 9.4 million user records were leaked. Of the affected individuals, over 100 000 were from the UK. The data breach was the result of unauthorized access to Cathay Pacific’s servers that dated…
Read more

code cyber vulnerability in new devices

A New Citrix Device Vulnerability Has Been Discovered

A new security vulnerability has been discovered in Citrix devices. The Canadian Centre for Cybersecurity has advised Canadian businesses to temporarily disconnect their Citrix devices from the internet. The repair patch has been rolled out as of January 19th 2020, with additional patches scheduled for January 24th. Users are advised to patch their devices as…
Read more
Windows 7 end of life time to update to windows 10

Today We Say Goodbye to Windows 7

Goodbye Windows 7 - today, January 14th 2020, is the day that Microsoft officially ends security support for Windows 7 computers. This means that PCs still running the decade old operating system will no longer be receiving security updates from Microsoft. According to NetMarketShare's statistics, 1/3 of PCs around the world are still running Windows…
Read more

How The Dexphot Malware Evolves To Avoid Detection

Dexphot is a malware that has raised concern over its complex strategy of avoiding detection. First detected in October 2018, Dexphot is a strain cryptojacking malware. Cryptojacking malware is defined by its main goal of secretly hijacking computer resources in order to generate digital currencies for the cyberattacker. The victim’s computer suffers slowdowns, and is…
Read more
european airport infected with malware

European Airport Finds 50% of its Computers Infected With Malware

50% of the workstations at an international airport in Europe have been infected by a cryptomining malware. The breach was discovered by researchers from cybersecurity company Cyberbit. The researchers stated that they detected the malware due to abnormal activity of the PAExec tool and Reflective DLL Loading on the infected computers. What is cryptojacking? Cryptojacking…
Read more
businessman internal employee data breach

Employees Maliciously Cause Data Breaches at American Express and Yahoo

In two separate incidents, U.S. companies American Express and Yahoo have both been affected by data breaches of their clients’ personal information. Both attacks were the result of insider threats – a type of cyberattack caused by an internal person in the company. The American Express Incident American Express stated that data that was leaked…
Read more
hacking coding dangerous software vulnerabilities to be patched

The Most Dangerous Software Errors Have Been Identified

American Not-for-profit research organization MITRE has published their 2019 report for the “Top 25 Most Dangerous Software Errors”. In their report, MITRE placed buffer flaws and cross-site scripting at the top of their list. The CWE list of top 25 most dangerous software errors is a useful reference for software developers and cybersecurity professionals when…
Read more

What Is Malware and How Can You Stop It?

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls. There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user…
Read more
work-731198_960_720

3rd Party Programs: Are They Cybersecurity Weakpoints?

Almost 400 dental offices were infected with ransomware in a cyberattack this August. The computers became infected after DDS Safe, a 3rd party cloud backup software that all the affected offices were using, was compromised. The software was developed by Dental Technology Company PerCSoft. Affected offices had their computer files encrypted behind ransomwalls. On August…
Read more