Services About Insights Pricing Contact

Security Insights

Expert tips, industry trends, and practical advice to keep your business secure.

Receiving Calls From Numbers Similar to Yours?
Cybersecurity March 25, 2022

Receiving Calls From Numbers Similar to Yours?

If you’re receiving phone calls from unknown numbers that have similar digits to your own, or from the same area code, you may be a target of a ‘Neighbour Spoofing’ attack.

Read Article →
Log4j: The security vulnerability affecting every corner of the internet
Cybersecurity December 22, 2021

Log4j: The security vulnerability affecting every corner of the internet

A major cybersecurity vulnerability, known as the Log4j vulnerability, is impacting nearly all of the internet, sending everything from financial institutions to government entities scrambling to patch their systems, before cybercriminals and nation states can launch cyberattacks.

Read Article →
How Easily Can Your Emails be Compromised?
Email Security December 10, 2021

How Easily Can Your Emails be Compromised?

This written piece explores the ins and outs of email security, how easily it serves as a delivery vector for compromisation, and what we can do to prevent this from happening.

Read Article →
How a Vancouver crypto trader lost $500,000 in Bitcoin
Cybersecurity December 8, 2021

How a Vancouver crypto trader lost $500,000 in Bitcoin

This written piece dives into a case study concerning a crypto day-trader, how they lost 100,000 Bitcoin to a hacker, and how they secured their system after the fact.

Read Article →
The Bitcoin Scam Ravaging Instagram: Bitconning
Social Media Security December 3, 2021

The Bitcoin Scam Ravaging Instagram: Bitconning

Account security is always a concern when you put any kind of personal information out on the web. But a new generation of scammers is emerging, using a particularly devious combination of social engineering, cryptocurrency, and old-fashioned blackmail. The scam is becoming more common on Instagram, where popular account holders are targeted and forced to assist in swindling their followers with fake videos.

Read Article →
What is the OSI model
Cybersecurity December 1, 2021

What is the OSI model

The Open Systems Interconnection model, or OSI for short, is a conceptual framework which describes the seven layers that computer systems use to communicate over a network. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

Read Article →
What is Hybrid Malware
Threats November 26, 2021

What is Hybrid Malware

Malware can fall into many categories including ransomware, spyware, scareware, adware, crimeware, viruses and includes various delivery vectors including worms, Trojans, backdoors, and root-kits. However, the most common form of malware is actually not malware itself, but rather ...

Read Article →
What is Crimeware
Cybersecurity November 24, 2021

What is Crimeware

Crimeware, perhaps one of the more self-explanatory terms, is a class of malware designed specifically to facilitate and enable cybercrime. Typically, crimeware is designed to perpetrate identify theft in order to access a computer user's data

Read Article →
What is Grayware
Cybersecurity November 19, 2021

What is Grayware

Grayware, despite its name, is not directly malware but rather an umbrella term to describe software tip-toeing the line between malware and legitimate software; this gray area sits software whose behavior is not malicious but rather undesirable or annoying.

Read Article →
What Is Adware
Cybersecurity November 17, 2021

What Is Adware

Adware is an intrusive malware which automatically displays or otherwise downloads unsolicited advertisements. Initially lumped within the larger category of spyware, adware was soon separated because of its ability to do much more than simply display targeted advertisements.

Read Article →
What is Spyware
Cybersecurity November 12, 2021

What is Spyware

With the demand to monetize data, hackers and criminals have resorted to spyware as a means to collect and subsequently sell data to anyone willing to purchase. How much do you know about their tactics and what can you do to stay safe?

Read Article →
The Different Levels of MFA
Security Best Practices November 10, 2021

The Different Levels of MFA

The recent rise in online and digital security threats has given birth to a new form of authentication: Multi-Factor Authentication (MFA). However, not all forms of MFA were created equal ...

Read Article →