1742 10 Ave SW, Calgary, AB T3C 0J8
1742 10 Ave SW, Calgary, AB T3C 0J8
Protect your business today!!
Protect your business today!
The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.
A criminal dealing in stolen credentials can make tens of thousands of dollars from buyers interested in purchasing credentials. And by selling those credentials to multiple buyers, organizations that experience a breach of credentials can easily be under digital assault from dozens or even hundreds of attackers.
Do you know if your sensitive information is available for purchase on the Dark Web?
With the sharp increase of remote workers during COVID-19, malicious attacks have also increased. As users are working remotely often they’re not under the same protection. This has lead to more attacks targeting remote workers.
Instances of cyber-crime appear to have jumped by as much as 300 percent since the beginning of the Coronavirus pandemic, according to the FBI. The bureau’s Internet Crime Complain Center (IC3) said last week that it’s now receiving between 3,000 and 4,000 cybersecurity complaints every day, up from the average 1,000 complaints per day the center saw before COVID-19 took hold.
If you’ve not taken any additional measures to address these concerns you may be susceptible to an attack.
Privacy and cyber-security is a big concern to businesses, for the second consecutive year. This is according to a new report by Protiviti and ISACA, based on a poll of 1300 IT audit and internal audit leaders and professionals.
The report finds that, surprisingly 37% of businesses did not add cyber-security within their audit plans. Many have failed mostly due to a lack of resources. A key finding of the report suggests:
Considering the growing risk landscape resulting from cybersecurity threats and emerging technologies, more organizations should consider an approach that includes continually reviewing the IT risk landscape and adjusting IT audit plans accordingly.
If you have not incorporated security into your yearly audits, we can help!
Identification, valuation and categorization of IT assets is critical to properly developing and deploying the required security controls for your business.
Organizations implementing security controls must first identify and categorize the organization’s IT assets that need protection. Without understanding the value of your IT assets you can’t place the proper security controls around them.
An recent IBM study revealed that the mean time before detection for a breach was 197 days:
This year we conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. According to the findings, data breaches continue to be costlier and result in more consumer records being lost or stolen, year after year.
A majority of businesses that have been breached are unaware for months, while some only find the breach due to the offending party reaching out. Without detection methods or proper procedures in place your business is vulnerable.
With the increase of workers accessing company resources remotely, businesses need to be protected. Some important things to consider:
Does the machine connecting to the corporate network have an Anti-Virus/Spyware protection? Is it up to date for security patches? Is it connecting through a secured connection? How are you confirming the above?
Due to the increase of targeted attacks on remote workers during Covid-19 your business needs to be vigilant.
As COVID-19 continues to impact businesses having a Disaster Recovery Plan or Business Continuity Plan is more apparent. A 2017 Study on Disaster Recovery Statistics shows that:
- 33% of businesses are unprepared for disaster, despite having an existing Disaster Recovery Plan (DRP) in place
- 33% of business have no disaster recovery plan at all.
- 90% of Businesses will fail after a disaster without a DRP in place
- 96% of Businesses survive ransomware attacks when they have a reliable DRP in place.
Using well-accepted methodologies can help minimize the impact, cost, and recovery time for your organization when an incident occurs.
Schedule your free consultation with us today!
Microsoft takes care of quite a bit for companies, it manages their Office 365 infrastructure and maintains uptime for their users. However…
Microsoft does not back up your data.
In the event of a Ransomware attack, virus or any compromise to your files would be unrecoverable.