Blog
130 Cyber Security Statistics: 2024 Trends and Data
Mon, 08/12/2024
Cybersecurity awareness is an everyday job, and it’s easy to fall into a false sense of security once you have a solid plan in place. Every year, statistics are a reminder that hackers and scammers never sleep. New trends and attack types pop up daily, making it difficult to keep track.This list is a rundown of the most important statistics of the year, providing a good overview of threats to keep...
Blog
The 2023 Gone Phishing Tournament Results: Everything You Need to Know
Tue, 02/20/2024
The results of Fortra’s Gone Phishing Tournament are here, and they highlight the potential power and danger of phishing across the world.
This global test uncovered that 1 in 10 individuals are susceptible to these attacks, which would have led to 90,000 compromised passwords if the campaign had been an actual cyber attack.
This year’s tournament featured an updated email and landing page to...
Blog
Swipe Right on Cyber Security: Let’s Talk About Zodiac Signs
Mon, 02/12/2024
With Valentine’s Day upon us, our thoughts turn to love, compatibility, and cyber security.
As Cupid strings his bow this Valentine’s Day, let’s explore how the stars might be influencing your approach to online security. Are you a Leo who roars against cyber threats, or a Pisces swimming through the sea of digital privacy?
Remember, while the universe might hold many mysteries, your cyber...
Blog
What is Quishing?
Fri, 02/09/2024
QR codes have come a long way since being invented in 1994 by a subsidiary of Toyota. Initially introduced to address some limitations of barcodes during the car manufacturing process, QR codes have since become staples in people’s day-to-day lives.
The introduction of high-powered cameras to most modern smartphones is what allowed these codes to gain new uses. QR codes, easily generated and cost...
Blog
The 7 Most Dangerous Healthcare Cyber Attacks
Fri, 02/02/2024
While industries like banking and software can be devastated by cyber attacks, no other field is impacted by hackers like healthcare.
As an example, it’s hard to forget attacks like the ransomware that brought all 400 locations of Universal Health Services to a standstill for months in the United States. Healthcare facilities often can’t operate if they don’t have access to crucial information...
Blog
Law 25: Everything You Need To Know to Ensure Compliance
Fri, 01/26/2024
Online privacy and data protection have become pressing issues in recent years that many governments have decided to legislate. The Legault CAQ government has been behind many digital-related innovations, so it’s not surprising to see legislation like this.
This law is a legislative update since existing laws inadequately address digital data. It should be noted that Law 25 has teeth and isn’t...
Blog
The Evolution and Limitations of Multi-Factor Authentication
Mon, 01/22/2024
As careers, banking, and healthcare move online, the need for more secure authentication has become increasingly urgent. While passwords have been adopted as the most common form of authentication, they pose many problems in terms of cyber security.
In recent years, especially since the rise of remote work in 2019, the adoption of multi-factor authentication (MFA) has steadily risen to over 60%...
Blog
Protecting Retail Businesses from Cyber Attacks
Fri, 11/24/2023
Retail stores are one of the oldest ways humans exchange goods and services. As they evolve, one of the most significant shifts they have undergone is the dramatic increase in technology integration within their operations.
From tools to check stock to staffing management and cash registers, retail stores rely heavily on technology for almost every aspect of their business. Unfortunately, all...
Blog
Updated FCC Legislation Could Mean New Data Privacy Requirements for Telecoms
Mon, 08/14/2023
Telecommunications companies (telecoms) have been prime targets for cyber attackers. They operate critical infrastructure passage, and vast amounts of customer data pass through their networks.
The United States Federal Communications Commission (FCC) is aiming to strengthen data security with new regulations around data breach reporting by communications carriers.
The agency has long required...
Blog
Android vs iOS: Which Operating System is Safer?
Mon, 07/10/2023
Cellphones have seen one of the most dramatic technological growths of any hardware in recent history. From simple portable phones a few decades ago, they’ve become fully-fledged computers with their own OS and applications used daily by most people worldwide.
Smartphones have become such a fixture of life, and hackers and scammers have been working to exploit these devices for personal gain....
Blog
How To Prevent Ransomware
Fri, 06/02/2023
To prevent ransomware, companies need to focus on giving their employees actionable security awareness training that educates, empowers, and motivates. For this to happen, employees must understand the facts around ransomware and the profound, long-term impact it can have on the company.
Once a ransomware attack is successfully executed, there are very few options for the affected company apart...
Blog
The California Privacy Rights Act (CPRA) and How it Affects Your Business
Thu, 03/23/2023
New regulations are already keeping IT professionals on their toes in 2023. One monumental change for California residents and businesses is the California Privacy Rights Act (CPRA).
The legislation came into force on January 1, 2023. Legislators drafted the new rules to empower consumers and close gaps in the California Consumer Privacy Act (CCPA).
The CPRA gives customers more control over...
Blog
What You Need to Know About the Kaseya Ransomware Outbreak
Thu, 07/22/2021
In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients.
The Kaseya ransomware outbreak is one of the latest high-profile ransomware attacks targeting...
Blog
Examining The 2020 Healthcare Ransomware Surge
Fri, 11/06/2020
How to Protect Against Ryuk Ransomware
As countries worldwide struggle to come to grips with the Covid-19 pandemic, attackers have attempted to capitalize by launching a wave of ransomware attacks on hospitals across the U.S. and Canada. These attacks have taken place in locations ranging from New York, Nebraska, Ohio, Missouri, and Michigan, to Montreal, by using Ryuk ransomware.
But what is...
Blog
This is Why You Need Mobile Responsive Security Awareness Training
Tue, 06/30/2020
(7 min read)
Hint: It has everything to do with effective mobile learning.
The past decade’s explosion of smartphone and tablet usage has magnified the importance of well-designed mobile responsive content as a vital part of any training program. Recent studies echo clear mobile learning preference statistics, including how:
70% of learners feel more motivated when training on a mobile device...
On-Demand Webinar
Everything You Ever Wanted to Know About the GDPR
DURATION: 45 MINUTES
During this webcast, you will learn more about the GDPR's key concepts and principles, as well as the personal data rights protected under this regulation.
Watch the GDPR webcast and reduce the risk of facing penalties for non-compliance!
During this free webcast, learn more about:
What is the GDPR?
Who is impacted?...
Video
Ransomware: Move from Beware to Be Aware!
Tue, 12/04/2018
DURATION: 40 MINUTES
Do you fear that your organization’s data will be kidnapped and held for ransom?
It is critical for CISOs and security teams to have the right methods, tools and techniques to stop ransomware from infecting their environment. An effective approach goes beyond technology and processes—it needs to include the human factors that contribute to ransomware risks.
Do you have a...
Blog
Governance and Information Security
Thu, 02/13/2014
Information security governance is a subset of corporate governance and can complete or encompass the governance of information technologies. It directs or strategically aligns information security activities and ensures that the company’s business objectives are reached. It also guarantees that information security risks are adequately managed and that information resources are used responsibly.
...