The Challenge of Securing Microsoft’s Remote Access Solutions For decades, Remote Desktop Protocol (RDP) software has been used to connect to users and computers remotely. Recently, the number of implementations has increased ten-fold as organizations responded to the global pandemic and the need to work remotely was a requirement of survival. Organizations of all sizes, including those that already had remote access solutions in place, … Continue reading Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)
Category Archives: Cyber Security
Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work
What is Virtual Private Networking? A Virtual Private Network (VPN) is a remote access tool used by most organizations to allow employees, vendors/partners and other stakeholders access to their company’s corporate networks and resources. When configured and deployed correctly, a VPN can help ensure that access is secure. However, Cytelligence has observed that in many cases VPN technologies are deployed in a manner that may increase risk to an organization by opening a doorway for cyber-attackers to exploit. What is Remote Desktop … Continue reading Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work
Ransomware Protection Best Practices
Remote Worker Cyber Hygiene Tips
COVID–19 has slowed down business but unfortunately hasn’t slowed down cybercrime. In our new reality we need to work from home in a safe and secure way to protect both our personal and corporate data. With that said, here is a work from home security tips designed to keep you and your family safe. Be aware of phishing emails Cybercriminals are out … Continue reading Remote Worker Cyber Hygiene Tips
Cyber Security in the Era of the Smart Home Devices
From the apps and websites we use every day to the numerous connected devices we continue to add to our homes, there are more ways than ever cybercriminals can hack your data. As we enter a more connected reality, we need to be increasingly aware that smart home and IoT (Internet of Things) devices may … Continue reading Cyber Security in the Era of the Smart Home Devices
Ransomware in 2020
Ransomware is becoming an epidemic in the cybersecurity world, with new strains being created continuously by criminals to extort money out of unsuspecting users. Cybercriminals are becoming more and more sophisticated. From the comfort of their own homes without any physical contact, they can launch virtual kidnappings of valuable digital assets and hold them hostage … Continue reading Ransomware in 2020
Cybersecurity in 2020
While we saw the threat landscape change in 2019 with even more sophisticated attacks, we predict 2020 to be even more extreme. More targeted ransomware – 2019 saw ransomware exploits getting highly targeted against specific businesses, as well as local government. Attackers are spending more time intelligence-gathering on their victims, to ensure they can inflict … Continue reading Cybersecurity in 2020
CBC News: U.S. Bracing for Iran’s Response
Recently, Cytelligence CEO Daniel Tobok sat down with CBC’s Natasha Fatah to discuss Iran’s capabilities when it comes to attacking U.S. sites and infrastructure. Natasha Fatah: A relatively unknown site in the U.S., all of a sudden has an image of President Donald Trump being punched His face is bloodied and the word Iran is … Continue reading CBC News: U.S. Bracing for Iran’s Response
IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers
Recently, IT World Canada sat down with Managing Partner and COO Ed Dubrovsky to discuss the state of cybersecurity in 2019 and a look ahead to 2020. Dubrovsky sees some complacency in the attitude of Canadians and organizations. “We’re just accepting this is a risk,” as a result of the almost daily stories of breaches. … Continue reading IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers
IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities
This week, the gang behind the Maze ransomware strain launched a public website listing victims who have yet to pay up, threatening that if no payment is received they will publish the data stolen from those companies for all to see. Ed Dubrovsky, Managing Director of Cyber Breach Response weighed in on the discussion with … Continue reading IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities
The Gift of Cyber Security for the Holidays
It’s that time of year! As staff become distracted by annual deadlines, office parties, their Christmas preparations and so on, they’re more likely to make mistakes. In their haste, they might open a link in an email that they would normally have checked, open a fun ecard from a co-worker or try and help their … Continue reading The Gift of Cyber Security for the Holidays
Protect your business from Business Email Compromise (BEC) attacks
Business Email Compromise (BEC) attacks are a growing threat to businesses both large and small because they prey on the vulnerabilities that technology can’t patch – people. While people may be your strongest asset, when it comes to cybersecurity, they can also be your weakest link. What is Business Email Compromise? BEC, also known as … Continue reading Protect your business from Business Email Compromise (BEC) attacks
Don’t Let Cybersecurity Spook You This Halloween
Children around the globe are getting ready to be scared and surprised this Halloween. However, scared and surprised are not how you want to run your business. During this Cybersecurity Awareness season, it’s time to be aware of cyber security intelligence and protect yourself from hackers’ tricks. Trick or Trojon – Malware for Hackoween Malware comes in all sorts of shapes and … Continue reading Don’t Let Cybersecurity Spook You This Halloween
CTV: TransUnion breach shows rising threat of third-party cyberattacks
A cybersecurity breach at TransUnion has underscored the rising threat of third-party attacks and the difficulty of preventing them. The credit monitoring agency confirmed this week that the personal data of 37,000 Canadians was compromised when someone illegally used a legitimate business customer’s login to access TransUnion data. Daniel Tobok, CEO of Cytelligence Inc., said … Continue reading CTV: TransUnion breach shows rising threat of third-party cyberattacks
IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders
IT World Canada recently interviewed Managing Director of Cyber Breach Response Ed Dubrovsky on the importance of understanding the state of cyber security during this important Cyber Security Awareness Month and how organizations should be prepared. Read part of the article below. “According to Ed Dubrovsky, managing director for cyber breach response at the Toronto-based … Continue reading IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders
As Seen in Forbes: Spearphishing – A Story Behind The Numbers
It’s hard to read about cybercrime without seeing the term “phishing.” This is where a hacker sends you a seemingly legitimate link, from a seemingly legitimate source. The problem, of course, being that the link in question was created for the sole purpose of stealing your money or your data. This type of crime has … Continue reading As Seen in Forbes: Spearphishing – A Story Behind The Numbers
The Loop: So, you’ve been hacked. Here’s what you should do
Cytelligence CEO Daniel Tobok sat down with CTV’s Your Morning to discuss what happens when you’ve been hacked and what steps you should take such as: Credit monitoring Financial statement monitoring Scam prevention Verifying information Read the full article here
CTV Your Morning: So, you’ve been hacked, here’s what you should do
In the wake of the recent Capital One hack that went public, you might be concerned about the safety of your information online. It’s something you probably don’t think about enough – what happens when you’ve been hacked? What are the immediate steps you should take? Security expert and Cytelligence CEO Daniel Tobok has the answers … Continue reading CTV Your Morning: So, you’ve been hacked, here’s what you should do
Capital One data breach impacts millions
Capital One Breach: Q&A with Cytelligence CEO Daniel Tobok
In one of the biggest data breaches ever, a hacker gained access to more than 100 million Capital One customers’ accounts and credit card applications earlier this year. Paige Thompson is accused of breaking into a Capital One server and gaining access to 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers and 80,000 … Continue reading Capital One Breach: Q&A with Cytelligence CEO Daniel Tobok