Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)

All posts by Cypfer

Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)

The Challenge of Securing Microsoft’s Remote Access Solutions  For decades, Remote Desktop Protocol (RDP) software has been used to connect to users and computers remotely. Recently, the number of implementations has increased ten-fold as organizations responded to the global pandemic and the need to work remotely was a requirement of survival.   Organizations of all sizes, including those that already had remote access solutions in place, … Continue reading Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)

Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work

What is Virtual Private Networking?  A Virtual Private Network (VPN) is a remote access tool used by most organizations to allow employees, vendors/partners and other stakeholders access to their company’s corporate networks and resources. When configured and deployed correctly, a VPN can help ensure that access is secure. However, Cypfer has observed that in many cases VPN technologies are deployed in a manner that may increase risk to an organization by opening a doorway for cyber-attackers to exploit.   What is Remote Desktop … Continue reading Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work

Remote Worker Cyber Hygiene Tips

COVID–19 has slowed down business but unfortunately hasn’t slowed down cybercrime. In our new reality we need to work from home in a safe and secure way to protect both our personal and corporate data. With that said, here is a work from home security tips designed to keep you and your family safe.   Be aware of phishing emails  Cybercriminals are out … Continue reading Remote Worker Cyber Hygiene Tips

Ransomware in 2020

Ransomware is becoming an epidemic in the cybersecurity world, with new strains being created continuously by criminals to extort money out of unsuspecting users. Cybercriminals are becoming more and more sophisticated. From the comfort of their own homes without any physical contact, they can launch virtual kidnappings of valuable digital assets and hold them hostage … Continue reading Ransomware in 2020

Cybersecurity in 2020

While we saw the threat landscape change in 2019 with even more sophisticated attacks, we predict 2020 to be even more extreme. More targeted ransomware – 2019 saw ransomware exploits getting highly targeted against specific businesses, as well as local government. Attackers are spending more time intelligence-gathering on their victims, to ensure they can inflict … Continue reading Cybersecurity in 2020

IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers

Recently, IT World Canada sat down with Managing Partner and COO Ed Dubrovsky to discuss the state of cybersecurity in 2019 and a look ahead to 2020. Dubrovsky sees some complacency in the attitude of Canadians and organizations. “We’re just accepting this is a risk,” as a result of the almost daily stories of breaches. … Continue reading IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers

Celebrating those individuals who have gone above and beyond in 2019

Cypfer was thrilled to honour our best & brightest at the 2019 Cypfer Christmas and Awards Dinner in Toronto, Ontario. The night started off with an exclusive cocktail reception followed by an awards dinner and ceremony. “Our awards are a special time when our people get the opportunity to recognize their colleagues, call out outstanding … Continue reading Celebrating those individuals who have gone above and beyond in 2019

IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities

This week, the gang behind the Maze ransomware strain launched a public website listing victims who have yet to pay up, threatening that if no payment is received they will publish the data stolen from those companies for all to see. Ed Dubrovsky, Managing Director of Cyber Breach Response weighed in on the discussion with … Continue reading IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities

The Gift of Cyber Security for the Holidays

It’s that time of year! As staff become distracted by annual deadlines, office parties, their Christmas preparations and so on, they’re more likely to make mistakes. In their haste, they might open a link in an email that they would normally have checked, open a fun ecard from a co-worker or try and help their … Continue reading The Gift of Cyber Security for the Holidays

Protect your business from Business Email Compromise (BEC) attacks

Business Email Compromise (BEC) attacks are a growing threat to businesses both large and small because they prey on the vulnerabilities that technology can’t patch – people. While people may be your strongest asset, when it comes to cybersecurity, they can also be your weakest link. What is Business Email Compromise? BEC, also known as … Continue reading Protect your business from Business Email Compromise (BEC) attacks

Don’t Let Cybersecurity Spook You This Halloween

Children around the globe are getting ready to be scared and surprised this Halloween. However, scared and surprised are not how you want to run your business. During this Cybersecurity Awareness season, it’s time to be aware of cyber security intelligence and protect yourself from hackers’ tricks.  Trick or Trojon – Malware for Hackoween  Malware comes in all sorts of shapes and … Continue reading Don’t Let Cybersecurity Spook You This Halloween

CTV: TransUnion breach shows rising threat of third-party cyberattacks

A cybersecurity breach at TransUnion has underscored the rising threat of third-party attacks and the difficulty of preventing them. The credit monitoring agency confirmed this week that the personal data of 37,000 Canadians was compromised when someone illegally used a legitimate business customer’s login to access TransUnion data. Daniel Tobok, CEO of Cypfer Inc., said … Continue reading CTV: TransUnion breach shows rising threat of third-party cyberattacks

IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders

IT World Canada recently interviewed Managing Director of Cyber Breach Response Ed Dubrovsky on the importance of understanding the state of cyber security during this important Cyber Security Awareness Month and how organizations should be prepared. Read part of the article below. “According to Ed Dubrovsky, managing director for cyber breach response at the Toronto-based … Continue reading IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders

As Seen in Forbes: Spearphishing – A Story Behind The Numbers

It’s hard to read about cybercrime without seeing the term “phishing.” This is where a hacker sends you a seemingly legitimate link, from a seemingly legitimate source. The problem, of course, being that the link in question was created for the sole purpose of stealing your money or your data. This type of crime has … Continue reading As Seen in Forbes: Spearphishing – A Story Behind The Numbers

Ransomware – An introduction and evolving trends

Ransomware attacks are growing more sophisticated by the day. The spelling and grammar issues that once alerted us to phishing emails are all but gone. Today, ransomware technologies are not only more sophisticated but more accessible, too. Just as cybercriminals adjust their attacks based on the changing security landscape, organizations need to be able to … Continue reading Ransomware – An introduction and evolving trends