Blog
How to Create a Strong Password in 7 Easy Steps
Fri, 03/29/2024
On May 7th of every year, organizations worldwide remind their end users of the importance of a strong password. But with remote workforces becoming the new normal and a sharp increase in the digital information exchanged daily, strong password best practices must be top-of-mind year-round.
Despite the increased public importance of data security,...
Blog
Pig Butchering Scam – What It Is and How to Protect Yourself
Mon, 03/25/2024
Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars.
Pig butchering has quickly become one of the most lucrative scams thanks to a mix of post...
Blog
Are Password Managers Safe to Use?
Mon, 03/18/2024
Passwords have become a cornerstone of the Internet. These strings of letters and numbers allow us to validate access to various communities, online tools, healthcare, banking, and more. As more and more information is stored behind passwords, efforts to steal and crack them have vastly increased.
These new cyber threats led to the creation of...
Blog
5 Examples of Strong Passwords That Will Secure Any Account
Fri, 03/15/2024
Passwords, our digital keys, wield a quiet power today. They protect your personal and business information, making them prime targets for hackers. With this power comes responsibility and the ongoing struggle to keep our virtual lives secure.
AI has also made accessing passwords easier for cyber criminals. Modern cyber criminals use AI solutions...
Blog
Protect your loved ones from phishing, social engineering and other cyber attacks
Tue, 02/13/2024
Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing, vishing, smishing, and social engineering.
Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive and...
Blog
How Security Leaders Can Use Multi-Factor Authentication to Protect Sensitive Data
Thu, 01/25/2024
As cyber criminals discover new ways to harvest login credentials, usernames and passwords have become less effective at keeping malicious users at bay.
Research shows there are over 15 billion stolen login credentials on the dark web, which criminals routinely use to steal sensitive information from modern organizations.
With such a high volume of data breaches and credential theft, the need to...
Blog
11 Cyber Security Tips for the Holidays
Thu, 12/07/2023
E-commerce growth is expected to grow by 9.4% by 2024; by 2027, it’s forecasted to hit a whopping $8 trillion for the first time.
More people shopping online means more opportunities for cyber criminals to strike. In fact, there’s a growing trend of cyber scams taking place during the holiday shopping spree.
As we all get busy with our holiday shopping and preparations, keeping security in mind...
Blog
How Is the Digital Age Redefining Social Engineering's Playbook?
Mon, 11/06/2023
Phishing has always been a prominent attack vector, skyrocketing as traditional hacks became more complicated. Even worse, hackers have begun perfecting their tactics to make them more reliable and damaging.
One of the most dangerous variants is social engineering, and with the help of AI, it's now becoming increasingly sophisticated. Let's discuss how AI is changing social engineering's playbook...
Blog
Cyber Security Preparedness in a Hybrid World
Sun, 07/30/2023
Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm.
A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog
9 Examples of Social Engineering Attacks
Fri, 04/14/2023
All examples of social engineering take advantage of human nature, such as the willingness to trust others, to trick individuals into divulging sensitive information. Despite its prevalence, social engineering can be challenging to distill into a single formula. It’s one of the reasons 82% of data breaches involve the human element. Social engineering has become the backbone of many cyber threats,...
Blog
What You Need to Know About the Google Drive Scam
Mon, 02/20/2023
Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog
13 Online Shopping Tips to Stay Safe During Black Friday and Cyber Monday
Wed, 11/16/2022
During the annual eCommerce bonanza known as Black Friday and Cyber Monday weekend, shopping websites will be swarming with people who are mostly unaware of cyber threats that can leave personal data vulnerable.
In 2021, Europe, Canada, and the United States saw a 50% spike in transactions during the Black Friday and Cyber Monday window from the previous week.
With the imminent spike in online...
Blog
Security Awareness and Working From Home: What About Devices with Personal Voice Assistants?
Tue, 03/23/2021
Personal voice assistants have proven to be a great technological innovation that improves lives daily. With 4.2 billion of these devices in use in 2020, they are no longer just a novelty, and, with workers staying home for the foreseeable future, voice assistants could pose a sizeable security risk.
Voice assistants are mostly known as standalone speakers that people talk to in order to execute...
Blog
What the Twitter Hack Revealed About Social Engineering
Thu, 07/23/2020
Less than a week ago, Twitter fell victim to a monumental security breach that saw hackers successfully orchestrate a social engineering attack and take over high-profile Twitter user accounts, including world-renowned companies like Apple and business magnates like Bill Gates and Elon Musk.
The cybercriminals used that access to launch a bitcoin scam that generated over $120,000. The attack is...
Guide
Password Security Training Kit
Promote strong password security practices within your organization with this password security kit.
Blog
Password Safety - Empower Your Workforce To Protect Sensitive Data
Fri, 10/12/2018
Make Your Passwords Secure Again!
In connection with the most recent security breaches, let's take a few minutes to highlight the importance of talking with your employees about password safety. Cyber criminals strive to infiltrate our networks and weak passwords are a way in.
Empowering your employees with cyber security awareness training is an excellent way to teach best practices for...
Blog
Consumerization of IT Through BYOD: Is Your Company Ready?
Mon, 03/03/2014
The consumerization of IT is when employees use their own personal mobile devices, such as laptop computers, tablets, smart phones, etc. at work, referred to as BYOD (bring your own device). This use is becoming increasingly common and exposes companies to a variety of risks, including the protection of personal information.
Canadian businesses appear to be leading the world in IT consumerization...