What Types Of Data are Cyber Criminals Most Likely To Steal?

Daniel Tobok E: dtobok@cytelligence.com Posted on: November 6, 2017 To effectively protect your organization against cyber criminals, it's important to understand what types of information and data are being targeted. The recent disaster at the Equifax credit reporting agency in the United States, which holds personal and financial information on millions of people, including executives … Continue reading What Types Of Data are Cyber Criminals Most Likely To Steal?

How Does Penetration Testing Work?

Daniel Tobok E: dtobok@cytelligence.com Posted on: June 25, 2018 There are numerous things a company can do to improve the security of its network and penetration testing is one of the most important. By understanding penetration testing basics, you will discover the importance of truly putting your network security to the test, and fortunately, Cytelligence … Continue reading How Does Penetration Testing Work?

Cyber Security for IT Startups

Daniel Tobok E: dtobok@cytelligence.com Posted on: October 25, 2018 IT startups have long been known for their hard work and devotion to the craft, and no matter if you are looking to provide a streamlined solution to an issue or solving issues in industry, startups are the life and blood of the IT world. However, … Continue reading Cyber Security for IT Startups

What Are The Typical Costs To A Business From A Cyber Attack?

Daniel Tobok E: dtobok@cytelligence.com Posted on: October 24, 2017 While the impacts of a cyberattack will be felt differently by small and large businesses, the damage caused by a breach can create a significant dent in a business' bottom line, no matter its size. The average security breach on a small business will cost about … Continue reading What Are The Typical Costs To A Business From A Cyber Attack?

Why Being Proactive About Cybersecurity is Your #1 Defense

Daniel Tobok E: dtobok@cytelligence.com Posted on: October 30, 2017 In the world of security, safety and privacy for your business, due diligence is your best friend. It's critical to the reliability and safety of your network and business infrastructure, which have likely evolved alongside the rise of cyber crime and corporate espionage activities. The time … Continue reading Why Being Proactive About Cybersecurity is Your #1 Defense

Best Practices: Five Keys to Effectively Monitor Employee Computer Activity

Daniel Tobok E: dtobok@cytelligence.com Posted on: April 13, 2018 Many companies monitor their employee's conduct online to make sure they are doing their job, not spending too much time on personal matters, or misusing company equipment. Monitoring an employee's computer activity is an essential element of an effective cybersecurity strategy. Whether it's protecting trade secrets … Continue reading Best Practices: Five Keys to Effectively Monitor Employee Computer Activity

Cyber Security Essentials: What Security Elements Should You Have in Place?

Daniel Tobok E: dtobok@cytelligence.com Posted on: November 10, 2017 It can be difficult to keep up with the pace at which information technology moves these days. Mobile technologies, the Internet of Things (IoT) and cloud computing are changing the types of assets businesses are connecting to their networks. This has created an environment where all … Continue reading Cyber Security Essentials: What Security Elements Should You Have in Place?

Introducing the Cyber Crime Equation

Danny Pehar E: dpehar@cytelligence.ca Posted on: April 4, 2019 Cytelligence is very proud to introduce its awareness training methodology, created in partnership with various law enforcement agencies. Read all about it in this Forbes article written Cytelligence Managing Director of Cyber Security Awareness Training Danny Pehar.

How Encryption Protects Against Corporate Data Breaches

Daniel Tobok E: dtobok@cytelligence.com Posted on: December 5, 2017 In today's business environment, data breaches are inevitable. No business is immune, as seen by the big companies falling victim to attacks in the news, almost every day. LinkedIn, Yahoo, and Equifax (just to name a few) are all massive enterprises that would seem capable of … Continue reading How Encryption Protects Against Corporate Data Breaches

Why Cloud Computing and Hosted Environments Can Make Forensic Investigations Challenging

Daniel Tobok E: dtobok@cytelligence.com Posted on: January 9, 2019 While there are similarities between cloud computing and hosted environments, there are also some key differences. Both platforms are vulnerable to breaches, and there are significant challenges in applying forensic investigation techniques to find out what happened in the event of a breach and establishing a … Continue reading Why Cloud Computing and Hosted Environments Can Make Forensic Investigations Challenging

Why Changing Behaviour, Not Sharing Information, Is The Key To Successful Cyber Security Training

Daniel Tobok E: dtobok@cytelligence.com Posted on: April 29, 2019 After working on the digital forensic assessments of many cyber security breaches, I've learned that hackers are not hacking tech anymore: They're hacking people. This isn't a new concept to anyone familiar with the world of cyber security, and it's what led me on a journey … Continue reading Why Changing Behaviour, Not Sharing Information, Is The Key To Successful Cyber Security Training