Blogs — Cyber Security

Categories

What is a Data Breach and How Do You Protect Yourself

Posted by Norma Stratton on

What is a Data Breach and How Do You Protect Yourself?

You have no doubt heard about data breaches happening over the past few years, but you may be unsure of what a data breach entails. In essence, a security breach is when private information is accessed by someone without permission to do so. With companies collecting and storing personal information about their customers, this can prove harmful to all parties involved; companies lose face and the trust of their customers, while individuals have their personal information exposed. Companies suffering a data breach have far more to worry about than just a loss of customer confidence—the average cost incurred by companies...

Read more →

Legal Consequences of a Cyberattack

Posted by Safe Harbour Informatics Incorperated on

Legal Consequences of a Cyberattack

If you have any doubts about your system’s ability to withstand a cyberattack, then you likely need to upgrade. If you do not, you could find yourself facing serious fines and legal issues in addition to a serious blow to your reputation. Data breaches are on the rise, but preparedness is not keeping pace, particularly among small- and mid-sized businesses. This means they are at greater risk of legal consequences as they are legally required to protect customer data in their possession. Cyber law is constantly evolving to ensure that proper protections are put into place. Failing to adequately protect...

Read more →

Facebook Ads Taken Out by Ragnar Locker Ransomware

Posted by Norma Stratton on

Facebook Ads Taken Out by Ragnar Locker Ransomware as a New Tactic

Facebook Ads Taken Out by Ragnar Locker Ransomware as a New Tactic The Ragnar Locker ransomware group followed up their November 3rd attack on Italian liquor producer Campari by taking out Facebook ads in which they threatened to release 2TB of stolen data if they did not receive $15 million paid in Bitcoin. Campari Group acknowledged the attack. Double-Extortion with a Twist This new tactic is a twist on the existing double-extortion tactic, which sees cyber criminals lock organizations out of their own systems and then threatening to release stolen data to the public unless their demands were met. By using...

Read more →

It’s Time to Take Data Seriously in 2021

Posted by Norma Stratton on

It’s Time to Take Data Seriously in 2021

It’s Time to Take Data Seriously in 2021 Everyone in a position of leadership will find themselves having to make decisions. Sometimes they will be easy, sometimes exceedingly difficult. When you run a business, your decisions can impact hundreds or even thousands of lives, so how do you ensure that you are making the right decisions? What it all comes down to is making informed decisions and to be informed, you require data. While proper decision-making has always relied on having good data, it is more important than ever as we head into 2021, with data management and analysis taking...

Read more →

How Remote Working is Making Cyberattacks Easier to Pull Off

Posted by Norma Stratton on

How Remote Working is Making Cyberattacks Easier to Pull Off

How Remote Working is Making Cyberattacks Easier to Pull Off The unique challenges of this year have forced companies the world over to make significant changes and adapt quickly to survive. Many businesses have allowed employees to work from home, and in many cases, this resulted in a positive change. Some stores, for example, have not only endured, but thrived by switching to an e-commerce model. Unfortunately, cyber criminals have also been quick to adapt, with less-than-desirable results. The necessity for businesses to remain digitally connected has resulted in an increase in ransomware attacks. And not only have they increased...

Read more →