New Android Ransomware in Forum Posts and Customized Texts
Cyber extortionists have created new ransomware that encrypts files on Google Android devices. Learn how this ransomware infiltrates devices so you can avoid becoming a victim. This new family of ransomware is known as Android/Filecoder.C. The initial infection occurs when Google Android device users download …
Security Protection Tips For Your Internal and Remote Workforce
As the number of off-site workers continues to increase, so are the data breach and malware exploitations. Check out our tips to assist in protecting your valuable data. Trust No One Data falling into the wrong hands, even if that person is an employee, can …
Understanding LifeLabs Massive Security Attack and Ransom
The huge news this week that affects millions of Canadians mostly in Ontario and British Columbia, was the hacking of personal information of approximately 15 million of LifeLabs customers. Info could include name, address, email, logic, passwords, date-of-birth, health card number and their lab test …
Just 52 Seconds for Hackers to Attack a Poorly Secured Server
Companies often enable Secure Shell (SSH) in servers, network attached storage (NAS), and other devices so that users can remotely access them. Security experts highly recommend using public-key authentication with SSH-enabled devices. However, some businesses still use password-based authentication, which leaves these devices vulnerable, particularly …
Is a Remote-Access VPN For You?
Setting up a remote-access VPN can be beneficial for companies with employees who often work offsite or use their own personal devices for work. If this is the case, it is important to provide a secure, reliable way to connect to your company’s computer systems. …
Password Manager Checklist for Your Business
Check out the recent CBC Interview with CopperTree Solutions, outlining key password tips for you and your business: https://www.cbc.ca/news/how-to-keep-track-of-all-those-unique-passwords-and-prevent-hacks-1.5017451 Having employees use unique, strong passwords for online accounts is crucial for your companies’ security strategies. We know how creating and memorizing numerous strong passwords can …
Why Both a Disaster Recovery and Business Continuity Plan Are Needed
Many companies think that disaster recovery and business continuity plans are one and the same. Learn the difference and why both plans are needed. Differences between Disaster Recovery and Business Continuity Plans Tornados, hurricanes, fires, floods, and other natural disasters can destroy a business. Digital …
IoT Devices Get Cyber Threats just like Computers
Warning! Installing an IoT-ready security camera or outfitting a crucial production system with IoT technology can put a business in harm’s way. In 2018, security researchers at SEC Consult revealed that millions of security cameras and other video surveillance equipment could be easily hijacked by cybercriminals. A …
Reputation Jacking: A New Hacker Trick
Cyber criminals use yet another trick. Besides using phishing emails to steal money and data from businesses, hackers now employ a technique known as reputation-jacking by using popular, legitimate cloud storage services or get into trusted sites to deploy malware. Phishing methods impersonate trusted brands, …
Remote Monitoring is Key to Doing Business Today
Keeping your computer systems secure and operating at peak efficiency is key in todays business environment. By contracting a remote monitoring service you can obtain data about your systems, allowing more efficiencies and cost savings, but also gain peace of mind. Here are a few …