Cyber True Crime: The Affiliate Part 2
Guest User Guest User

Cyber True Crime: The Affiliate Part 2

Welcome back to the cyber true crime blog series The Affiliate. Part 1 provided an introduction to ransomware, how RaaS works and where the ransomware gang we’ll be focusing on, NetWalker, fits into the narrative. In this second installment, we unravel how one becomes a member of NetWalker and the sort of malicious activities that the ransomware gang participated in.

Read More
Cyber True Crime: The Affiliate
Guest User Guest User

Cyber True Crime: The Affiliate

A Canadian man has been charged by the FBI of being one of the world’s top cybercriminals, making tens of millions of dollars as an agent of a shadowy international criminal organization known as NetWalker. This is his story.

Read More
Beauceron Security's 2022 Cybersecurity Predictions
Guest User Guest User

Beauceron Security's 2022 Cybersecurity Predictions

This year we sat down with Beauceron Security CEO, David Shipley, and asked him what his 2022 cybersecurity predictions are. You can listen to David’s full predictions below or keep reading to see a condensed version of what we believe the 2022 cyber landscape may have in store.

Read More
Looking Back on 2021
Guest User Guest User

Looking Back on 2021

Join us as we take a look at the predictions we made last year for what the 2021 cyber threat landscape would look like and see which came true and which ones weren’t as big a threat as predicted. To view the 2021 Cybersecurity Predictions blog, click here.

Read More
How to Foster Positive Behavioral Change
Guest User Guest User

How to Foster Positive Behavioral Change

While it may be easy to place the blame on people for data breaches and other cybersecurity incidents, the truth is that people are an organization’s first and best line of defense. Instead of viewing people as the victim, or punishing them for risky cyber behavior, it’s time to change the narrative and instead focus on empowering them through a cybersecurity culture that focuses on positive behavioral change.

Read More
Ransomware Basics
Guest User Guest User

Ransomware Basics

Ransomware, or ransom malware locks users out of their device or just certain files which can only be decrypted in exchange for a ransom. Back in the 1980s when ransomware attacks were just beginning to appear, cybercriminals would accept payment by mail. However, today payments are made via cryptocurrencies like Bitcoin. In the early days of ransomware, cybercriminals mostly targeted individuals, but gradually shifted to targeting businesses small and large which offered a higher pay out. You don’t even need to be especially technologically talented to become a ransomware attacker now with the growth of ransomware-as-a-service (RaaS).

Read More
Phishing for Your Information: Spear-Phishing and Whaling Explained
Guest User Guest User

Phishing for Your Information: Spear-Phishing and Whaling Explained

Did you know that 91% of cyber attacks are spear-phishing attacks? This makes them the most dangerous threat to individuals and organizations alike. In this blog, we define what spear phishing and whaling are, how to recognize a potential attack and how to protect yourself and your organization.

Read More
5 Emotions Used in Social Engineering
Guest User Guest User

5 Emotions Used in Social Engineering

Are you being bombarded with phishing emails? Are you worried even the most basic phish can infiltrate your organization? In this blog, we explain how social engineering works, how cybercriminals target your emotions and how to spot a potential phish.  

Read More
Zero-Day Vulnerability
Guest User Guest User

Zero-Day Vulnerability

A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw and can be exploited by cybercriminals.

Read More
Cyber Security and Business 2021 Survey
Guest User Guest User

Cyber Security and Business 2021 Survey

This survey will help the Cyber Centre prepare educational resources, tools and programs to better support SMBs at a national level in their cyber security journey. Keep reading to find out the key takeaways from the Survey and how businesses have responded to the challenges the 2021 cyber landscape has brought.

Read More
The Benefits of Enabling SSO
Guest User Guest User

The Benefits of Enabling SSO

Online services require different usernames, passwords and security questions. Managing all these credentials can be challenging, even for SMBs.

SSO speeds up the process of authentication without compromising security measures. Once SSO is enabled – forget about it! The heavy lifting is no longer on SOC’s shoulders and is the responsibility of a third-party authenticator or identity provider.

Read More
Phishing for Your Information: Smishing and Vishing Explained
Guest User Guest User

Phishing for Your Information: Smishing and Vishing Explained

Did you know that 85% of phishing attacks are happening over SMS messaging, gaming, social and productivity apps and over the phone? Continue reading to find out how you can protect yourself from smishing and vishing attacks and what to do if you’ve fallen for one.

Read More