Password management is a common challenge businesses in any industry face. A shocking number of businesses still rely on paper-based logbooks or unsecured spreadsheets to manage their privileged account credentials. According to Forrester (a leader in business technology research and advisory) estimates that 80% of data breaches involve privileged credentials which means organizations must make password protection a top priority in their security strategies. Read more
Articles tagged: intrusion protection
Encryption has become the most effective way for businesses of all sizes to best secure critical data. While it doesn’t prevent data from being accessible, it does render data unintelligible unless you have a secret key or password to decrypt or make the information readable.
With the introduction of Microsoft’s Windows BitLocker, business hardware (like servers, workstations, backup drives, etc.) can be protected by encryption; drastically improving the threat of data being stolen or exposed when a computer is lost or stolen. Encryption plays a significant role in data confidentiality on hardware and can be utilized in a variety of organizations including law firms, doctor office’s or businesses that supply laptops for employee’s use. Read more
As technology advances and becomes more accessible, consumers and businesses alike are able to take advantage of more cost effective, feature-rich solutions not previously available to them. Geofencing and Geo-IP filtering for hardware and software used to be a very costly tool implemented for very specific use cases. It is now technology featured in almost every smart phone, firewall or router most consumers already have in their possession, and is the foundation of several applications and services. Read more
A “golden key” or a universal back door method, allows the bypassing of normal authentication in a product, computer system or algorithm. If used ethically it can be used for securing remote access to a computer system or for debugging purposes. The controversy surrounding golden key methodology stems from the fact that in the wrong hands, it can also open up physical access to those with malicious intent.
Major hardware manufacturers like Apple, Microsoft and Blackberry have taken publicly dissimilar positions on releasing universal back doors to their devices. As the world increasingly depends on devices supplied by these few suppliers, it is important to know where they stand, so you have an idea where your sensitive personal data is likely to end up. Read more
Ottawa wins top rankings, in a game no one wants to be playing.
It is the malware infections (including phishing and ransomware) rate that Ottawa ranks highest in, even when compared to a city like Toronto where the population is significantly higher. Our city has taken notice, as Ottawa Hospital, Carleton University and several non-profit charities have fallen victim. In an effort to combat the attacks, Prime Minister Justin Trudeau announced last summer the public consultation on cyber security strategy, while the IT industry as a whole strives to share threat information about emerging threat vectors. Read more
The Digital Privacy act, originally passed in 2015, has updated elements of its legislation that will require Canadian businesses to adhere to strict guidelines and policies in order to protect confidential information and disclose security breaches. While each organization will have to prioritize its defenses, there will be certain criteria every one will have to follow. While official standards will be released later this year, there are steps you can and should implement immediately to improve you company’s security posture. Read more
As a response to the ever-evolving cyber-security threats Canadian businesses face in daily internet interactions, the federal government has responded. Later this year, newly drafted hacking disclosure legislation will require all businesses in Canada to report any cyber security breach as soon as they become aware of it. Read more
Two Factor Authentication is an extra security method that can be implemented to ensure specific online applications and services are fully protected. With recent password hacks and well publicized security breaches happening to companies small and large it aims to protect your network from phishing attacks and stolen credentials. Two factor authentication can be used as a proposed solution, but how safe is too safe? Read more
Bug bounties have good intentions but in a world where cyber warfare is a reality, it can lead to complex consequences were ethics and espionage come into play. When private companies compete to outbid each other’s bounties, it can create a dangerous playing ground that could potentially put million’s of users sensitive information at risk. Read more
Canadian businesses are quick to adopt modern technologies into their workplace. It’s how we remain competitive and connected to clients, partners and industry news. But the advancement of malware and constant security attacks makes it increasingly nerve-wracking to those who interact with sensitive business data. Our dependence on the internet makes us a prime target for cyber criminals. But its not just small time hackers, looking to wreak havoc on our computer systems. Cyber-warfare and state-sponsored attacks are on the rise and for many large countries are a central element to their military strategies. Read more