Artificial intelligence (AI) has become increasingly sophisticated, transforming the way we interact with technology. However, AI's prevalence has also paved the way for it to become involved in a cyber war between malicious actors and security providers.
Cyberattacks and security in the artificial intelligence era
The five types of hackers targeting SMBs
Small- or medium-sized business (SMB) owners may think they're unimportant enough to be targeted by hackers. But the truth is that SMBs are prime targets for hackers since they see these organizations — which have less security and fewer resources compared to enterprises — as easy marks.
What makes Canadian businesses attractive cybercrime targets, and what can you do about it?
Canada's cybercrime landscape is teeming with ransomware attacks, phishing schemes, data breaches, and a plethora of fraudulent activities, which means that, unfortunately, individuals and businesses are constantly at risk of being attacked.
This begs the question: what makes Canada-based businesses an attractive target to malicious actors? Here are some factors.
5 Data backup best practices to protect your business from ransomware
Backups are crucial to businesses, as they provide a safety net in the event of data loss, but they're even more critical in the event of a ransomware attack. This is because ransomware encrypts some or all of a business's data, effectively cutting access to live files and forcing users to rely on their backups to keep operations going.
Defending against watering hole attacks
More and more cybercriminals are launching watering hole attacks to gain access to company networks. But what exactly is a watering hole attack, and how can you protect yourself from it? Read on to learn how.
How watering hole attacks work
The term “watering hole” colloquially refers to a social gathering place where a particular group of people often go to.
How to protect your network from watering hole attacks
Cybercriminals are getting more creative in infecting computers with malware, and users must step up in order to protect their devices. To stay one step ahead of cybercriminals, you should learn more about their more insidious tricks such as watering hole attacks.
The 5 types of hackers who want to harm your business
You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won't be talking about white hat hackers in this blog.
A primer on watering hole attacks
Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals.
New Office 365 cyberattack on the loose
Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works.