Posted: Tuesday, October 19, 2021

Top 7 Ways to Prevent Ransomware Attacks

Top 7 Ways to Prevent Ransomware Attacks

Don't wait until it's too late

By : Sentia

Suppose ransomware or an encryption trojan gets onto your device. In that case, it locks your operating system or encrypts your data, getting hold of a digital hostage such as files and demanding a ransom to restore control to you. Currently, ransomware infections occur in various ways, including spam emails, software downloads, and insecure and fraudulent websites. The attacks leave victims in situations where they must pay horrendous sums of money for the possible release of their files and systems.

In case you are wondering if you are a potential target of a ransomware attack, there are a number of  ways you can get infected, including the use of devices with outdated software, running unpatched operating systems and browsers, lacking proper backup plans, and not paying sufficient attention to cybersecurity measures. The annual Canadian Internet Registration Authority (CIRA) Cybersecurity Survey suggests nearly 70 percent of Canadian organizations facing a ransomware attack last year paid the demands to avoid downtime, reputational damage, and other costs. The survey further reveals that one-quarter or more of organizations that suffered a ransomware attack were damaged in terms of recovery costs, loss of revenue and customers, or reputational damage.

Fortunately, you can reduce the likelihood of finding yourself in front of an infected computer or encrypted file by being prepared. In fact, it is possible to significantly reduce the chances of infection by implementing the following controls and best practices. So, as we wrap up Cybersecurity Awareness Month, here are our top 7 ways to prevent ransomware attacks.

Read more »

Number of views (68)

Posted: Tuesday, August 17, 2021

The Evolution of Cyber Security Volume 5: How do you prepare?

The Evolution of Cyber Security Volume 5: How do you prepare?

Fixing the error between the keyboard and the seat.

“If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders.” - Dan Farmer, Cyber Security Analyst, Researcher, Programmer

If you have read the previous post in our Cyber security series: Emergence of XDR, Importance of MDR, Importance of MFA and the True cost of a Data Breach, you might be wondering: “How do I solve these for the long term?"

Well, the answer is not simple. It starts with organizational policy review, revision, and enforcement.

Read more »

Number of views (485)

Posted: Friday, May 21, 2021

The Evolution of Cyber Security Volume 4: The True Cost of a Data Breach

The Evolution of Cyber Security Volume 4: The True Cost of a Data Breach

The knock-on effect of a data breach can be devastating for a company. When customers start taking their business—and their money—elsewhere, that can be a real body blow.” – Christopher Graham

In January 2021, we witnessed the largest ransomware demand in history: the $50 million ransom demand from Acer by REvil gang. Although the actual amount paid will be considerably less then the original demand it is still extremely lucrative for cybercrimals.

Read more »

Number of views (944)

Posted: Friday, April 16, 2021

The Evolution of Cyber Security Volume 3: Understanding the Importance of MFA

The Evolution of Cyber Security Volume 3: Understanding the Importance of MFA

One of the biggest problems with traditional user ID and password login is the need to maintain a password database. Whether encrypted or not, if the database is captured it provides an attacker with a source to verify their guesses at speeds limited only by their hardware resources. Given enough time, a captured password database will fall.

As processing speeds of CPUs increase, brute force attacks have become a real threat. GPGPU cracking can produce more than 500,000,000 passwords per second even on lower end gaming hardware. Depending on the software, it can take as little as 160 seconds to crack a 14-character alphanumeric password. A password database alone does not stand a chance against such methods when it is a real target of interest.

Read more »

Number of views (838)

Posted: Thursday, April 1, 2021

The Evolution of Cyber Security Volume 2: The Importance of MDR

The Evolution of Cyber Security Volume 2: The Importance of MDR

2020 brought unprecedented global changes and cyber security was no exception. From the widescale shift to remote working triggered by the pandemic, to the record-high cryptocurrency prices, to one of the worst cyber attacks of all time. The tools and tactics we started with in 2020 are no match for the threat landscape of 2021.

Read more »

Number of views (800)

Posted: Tuesday, February 23, 2021

The Evolution of Cyber Security Volume 1: The Emergence of XDR

The Evolution of Cyber Security Volume 1: The Emergence of XDR

A Closer Look at Where it all Began

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” Tim Cook

In the game of cat and mouse between data security and bad actors, extended detection and response (XDR) is the latest weapon that organizations can utilize to strengthen their security posture.

XDR is a new approach to threat detection and response, a key element in defending an organization’s infrastructure and data from damage or unauthorized access and misuse. 

Read more »

Number of views (1344)

Posted: Wednesday, September 18, 2019

Patch Management – What is it and why is it important to keep your IT systems secure?

Patch Management – What is it and why is it important to keep your IT systems secure?

A crucial security measure business' should be aware of and performing.

Let’s face it: we live in a digitally-driven world where we are constantly surrounded by increasing cyber security vulnerabilities and hackers waiting in the wings to make their next move.

Read more »

Number of views (8265)

Posted: Wednesday, February 20, 2019

Enterprise Security: Risks, Rewards, and New Regulations

Enterprise Security: Risks, Rewards, and New Regulations

Article Updated: February 2019

Were you one of the 90,000 Canadians whose data was stolen when two Canadian banks were recently hacked? 

Even if you weren’t, you can probably imagine the distress it caused – not just to the victims, but also to those at the banks responsible for safeguarding customer data and enterprise systems. Yes, the banks acted swiftly to launch investigations and enhance online security measures, but what could have been done to prevent the hack from happening in the first place?

Read more »

Number of views (4488)

Posted: Wednesday, January 30, 2019

We’re Watching These Five Technology Trends in 2019

We’re Watching These Five Technology Trends in 2019

The Future for Business as Technology Continues to Rapidly Evolve

Now that we’re a month into the new year, it’s time to take a look at the top technology trends most likely to disrupt business in 2019 and beyond. Some of these trends are a continuation of what we experienced in 2018, while others are exciting new developments. Here are our top five:

Read more »

Number of views (4416)

CategoryID: 53