The Grinch Wants Your Data: Holiday Shopping Do's & Don'ts
The Grinch Wants Your Data: Holiday Shopping Do's & Don'ts

29 November 2021

Shopping of all sorts is making a comeback after the impacts of the COVID-19 pandemic and Black Friday and Cyber Monday remain at the center of the season. Being back in the habit is a blend of in-store and online shopping now. Where there are deals, there are cybersecurity threats. While more consumers are aware of the weaknesses and data breaches out there, the number of attack vectors out there continues to rise and hackers are there to take advantage. When you’re out and online looking for discounts and deals, protect yourself from Grinches that want to get ahold of your data with these tips.

Keep Reading...

Vulnerability in Connected Western Digital My Book Live Drives Threatens to Wipe Data of Unsuspecting Owners
Vulnerability in Connected Western Digital My Book Live Drives Threatens to Wipe Data of Unsuspecting Owners

25 June 2021

A critical vulnerability in some WD My Book Live external drives caused some owners to find their data had be wiped by a remotely run command. Western Digital’s only recommendation in the wake of customer complaints and alarm was to unplug the devices from the internet to disconnect them from being compromised.

Keep Reading...

Rise in Data Threats Adds to Coronavirus Crisis
Rise in Data Threats Adds to Coronavirus Crisis

22 April 2020

As the COVID-19 pandemic continues to challenge countries all over the world, data is playing an important role in the fight but is also under heightened risk from threats to cybersecurity and data safety.

Keep Reading...

Data Prep Tips for Back-to-School/Work
Data Prep Tips for Back-to-School/Work

30 August 2019

As temperatures start to slowly drop, students and employees are emerging from a summer daze, hunkering down for the school year and getting get business in shape for the fall season. Here’s 3 ways you can get data-ready for back-to-school & back-to-work.

Keep Reading...

Throwback: A Data Recovery That Had Everything From Russian Hackers to Ransomware
Throwback: A Data Recovery That Had Everything From Russian Hackers to Ransomware

23 May 2019

Russian hackers? Ransomware before it was a thing? This recovery had everything.

Read this throwback newspaper story

Keep Reading...

The ABC’s of Cybersecurity
The ABC’s of Cybersecurity

30 May 2018

Not so long ago we were all anxiously biting our nails over the impending threat of the WannaCry cyberattack, which affected over 300,000 computers worldwide. Even though the ransomware attack was resolved in a matter of days, it swiftly incurred billions of dollars in damages. The reality is, it hasn’t been too long since this major attack, and threats to your own cybersecurity measures are as prevalent now as they were then. It’s important to take precautions when it comes to protecting confidential corporate information, but just what do those precautions entail?

Keep Reading...

I’ve Got the Power: Gearing Up for a Stronger, Greener Grid
I’ve Got the Power: Gearing Up for a Stronger, Greener Grid

21 March 2018

Lights out, everybody! A nationwide, permanent power outage could occur.

As our daily live grow more entangled with sophisticated devices and technology, so too does the potential for exploitation of vulnerabilities in those devices and systems.

Keep Reading...

Chomping at the Bit[coin] to Acquire Cryptocurrency?
Chomping at the Bit[coin] to Acquire Cryptocurrency?

2 March 2018

The Truth Behind the Currency of the Internet

Before deciding to hop on the Bitcoin bandwagon, it’s important to fully understand the risks and implications of the unknown world of encryption keys, digital tax evasions, and Blockchain technology.

Keep Reading...

International Data Privacy Day: Strong, Sensitive, Secure
International Data Privacy Day: Strong, Sensitive, Secure

25 January 2018

While the majority of North Americans were asking Santa for new tech, we were busy building a contingency plan to protect our existing devices. In December, we were all wishing for things. In January, it’s time to take action to protect our technology and sensitive data from prying eyes, ears, and keyboards.

Keep Reading...

6 Practical and Essential Data Safety Items to Put on Your Wishlist (And Check Twice)
6 Practical and Essential Data Safety Items to Put on Your Wishlist (And Check Twice)

20 December 2017

Our tech support and data recovery specialists have assembled a practical wish list for your cyber safety, so you can have the most wonderful time all year, every year (approved by The Big Guy, himself).

Keep Reading...

The Gift That Keeps on Giving: 5 Critical Changes to Cybersecurity Policy
The Gift That Keeps on Giving: 5 Critical Changes to Cybersecurity Policy

29 November 2017

2017 has been a particularly bad year for data debacles and cybersecurity breaches. Fortunately, federal and state governments, and companies—large and small—recognize that lasting, legislative change is required to prevent future cyber attacks and protect everyone’s data.

As we enter the season of giving, here’s what governments and businesses are offering to remedy past mistakes. The gift that keeps on giving? Progress in the form of policy change.

Keep Reading...

October: National Cybersecurity Awareness Month
October: National Cybersecurity Awareness Month

24 October 2017

Self-driving cars. Artificial intelligence. Smart home technology. Voice-activated home assistants. Virtual reality. The stuff of popular science fiction is no longer fiction. The future isn’t ahead; it’s already here.

Once again, it’s National Cybersecurity Awareness Month (NCSAM).

Keep Reading...

Equifax: Zero Credit for Poor Handling of Massive Data Breach
Equifax: Zero Credit for Poor Handling of Massive Data Breach

26 September 2017

“Based on the information provided, we believe that your personal information may have been impacted by this incident.”

Sound familiar? You and 143 million other people in the United States, the UK, and Canada.That’s right – Americans weren’t the only ones affected by the massive Equifax data breach.

It’s been quite a year for data breaches (many a result of escalating and evolving ransomware), but this situation was largely precipitated by Equifax’s negligence. Companies who feel they are taking extensive preventative measures can always do more. Being on the defense is not the same as mounting an offense.

Keep Reading...

Back-to-School, Back to Secure: Security Best Practices for All Age Groups
Back-to-School, Back to Secure: Security Best Practices for All Age Groups

17 August 2017

Whether it’s coming to a grinding halt or a gradual slowdown, there’s no doubt about it: summer is approaching its end. But while the temperatures are decreasing, hackers are increasing their efforts targeting networks and users of all ages. Cyberattacks span payment card fraud, unintended disclosure, hacking, malware, insider leaks, and ransomware—these are only a few of the most common approaches.

Different age groups vary in online behavior and thus, are susceptible to different online scams, threats, and pitfalls. Understanding risk factors is the first step toward protecting yourself.

Keep Reading...

Speeding Up or Slowing Down?: 7 Cybersecurity Startups to Watch in 2017
Speeding Up or Slowing Down?: 7 Cybersecurity Startups to Watch in 2017

21 July 2017

Overall, a previously burgeoning startup marketplace has been in decline since 2016. Dark Reading cites the startup slowdown a result of reduced funding from venture capital firms. However, one industry continues to boom, despite the overall decline: cybersecurity.

Keep Reading...

Paring Down the Data: Data Age 2025
Paring Down the Data: Data Age 2025

24 April 2017

IDC has released a long white paper, Data Age 2025, on the evolution of data in our lives, how we have moved through different eras of data and computing and highlighting key trends today. We break down the main points, talk about it’s new critical nature, and a bit about pizza toppings.

Keep Reading...

Loves Me, Loves Me Not: 4 Sweetheart Scams to Avoid This Valentine’s Day
Loves Me, Loves Me Not: 4 Sweetheart Scams to Avoid This Valentine’s Day

13 February 2017

With Data Privacy Day and Safer Internet Day behind us and Valentine’s Day just ahead, it’s time to take what we learned and apply it.

Keep Reading...

7 Security Resolutions for 2017
7 Security Resolutions for 2017

16 January 2017

The New Year carries the promise of infinite potential. Yet again, individuals are engaging in the common practice of resolution-making. But the percentage of people who see these resolutions through to conclusion is shockingly low.

The proliferation of technology has made time more precious than ever. Our lives move faster, so we need to accomplish more in a shorter period of time. We’d like to offer 7 security resolutions that you should make — and achieve — in 2017.

Keep Reading...

How the Grinch Stole Your Data

19 December 2016

E very human in Townsville stored data a lot…

Keep Reading...

October is National Cybersecurity Awareness Month
October is National Cybersecurity Awareness Month

19 October 2016

“In 2016, there have been 454 data breaches with nearly 12.7 million records exposed.”

If this statistic doesn’t scare you, it should.

October is dominated by Halloween: pumpkin carving, cider drinking, costume searching, candy eating, and Trick-or-Treating. Most people don’t realize that October is shared by another important event: National Cybersecurity Awareness Month.

Keep Reading...

You Shall Not Pass: The 10 Commandments of Password Protection
You Shall Not Pass: The 10 Commandments of Password Protection

21 September 2016

Lists confirm it: we are lazy when creating passwords. The sheer number of accounts, applications, and devices we own almost guarantees poor password quality. Employ these tips and best practices to fortify and protect your numerous accounts and devices.

Keep Reading...

Pokémon No-Go: What’s the Catch?
Pokémon No-Go: What’s the Catch?

15 July 2016

The mobile app, Pokémon Go, is a global phenomenon.

Pokémon Go mobile game screenshot Comfortably seated at No. 1 on mobile download charts for both iOS and Android users, the app has made virtual reality mainstream, prompting users to get off the couch and go explore the real world, but through a virtual lens.

However, people can collect a lot more than Pokémon.

We break down the basics of the game and look into some potential risks and threats to your data privacy, cybersecurity and more.

Keep Reading...

The Rise of Ransomware: How to Handle Data Hijacking
The Rise of Ransomware: How to Handle Data Hijacking

16 May 2016

Ransomware is all the rage—and not in a good way

Ransomware is all the rage—and not in a good way. Cybersecurity experts are calling these virtual attacks an ‘epidemic’ of epic proportions.

In fact, its exponential growth over the past few years has left individuals, companies, and industries feeling both enraged and powerless.

Why? Well, because the only protection against ransomware is caution.

Keep Reading...

The Hidden Hazard: Protecting Your Organization from Insider Threats
The Hidden Hazard: Protecting Your Organization from Insider Threats

8 February 2016

Cybersecurity concern: Insiders

Threats to the security and safety of your data are all around. Many people are familiar with the most common Internet dangers, such as Phishing scams, stolen passwords, browser vulnerability, and hackers. However, there’s another, more duplicitous danger at work. In recent years, Insider Threats have become a huge Cybersecurity concern.

Keep Reading...

Tips for Secure Online Shopping
Tips for Secure Online Shopping

9 December 2015

Keep Data Safe This Holiday Season

Increasingly more people are opting to do their holiday shopping online rather than subject themselves to the chaos of crowded malls this time of year. Saving people time and energy over the hectic holiday season is no doubt a great benefit brought by the evolution of the internet, but it doesn’t come without its own unique set of evils.

Recent incidents of cybersecurity and data theft have brought light to the risks consumers face when sharing and entrusting their sensitive data with corporations and third party institutions. Malicious intentioned cyber criminals continue to develop new, tech-savvy ways to hack into people’s private accounts for the purpose of stealing sensitive information.

Protect your data while doing your holiday shopping online this month with these tips and safety precautions.

Keep Reading...