5 Ways To Protect Your Employees From Email Phishing Attacks

5 Ways To Protect Your Employees From Email Phishing Attacks

General
Phishing attacks are one of the most common IT threats facing businesses in Canada. Numerous reports show that Canadians are increasingly targeted by phishing scams: according to the RSA Quarterly Fraud Report: Q1 2020, more than 65% of all phishing attacks were aimed at Canadian users. Perpetrators may launch attacks via text message, phone, or even social media, but email is the medium most commonly associated with this form of threat. But with people spending one-third of their time at work reading and responding to emails, it’s easy to miss warning signs of a suspicious message. And it could cause financial, operational, and reputational problems for your company. So, what can you do to protect your employees and reduce the risk facing your business? We’ll explore five techniques, and the…
Read More
How To Streamline IT Service Management for Your Business?

How To Streamline IT Service Management for Your Business?

General
How To Streamline IT Service Management for Your Business? Information technology is at the heart of countless businesses the world over. Global IT spending is estimated to be $4 trillion in 2021 (according to Gartner research), an 8.4% increase on 2020’s total ($3.75 trillion). As hardware and software facilitate so many business functions today, from communicating with clients to working remotely, effective IT service management (ITSM) is essential. But what does this mean? What benefits does good ITSM offer? And how can you streamline your ITSM successfully? We’ll answer these key questions, and help you get off to the right start, below. What is IT Service Management? IT service management refers to the various day-to-day activities related to your IT infrastructure and programs. This covers all the information technology your…
Read More
Threat Alert: Surge of Vishing Attacks

Threat Alert: Surge of Vishing Attacks

General
Threat Alert: Surge of Vishing Attacks The Federal Bureau of Investigation (FBI) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently issued a joint alert, warning organizations of the surge of vishing attacks. What Is Vishing? Vishing is a type of phishing attack that leverages the phone, in particular, Voice Over Internet Protocol (VoIP), as a means of attack. The commonly known phishing attack weaponized the emails. In an email-based phishing attack, an attacker sends targets emails that masquerade as coming from legitimate sources. Phishing emails contain malicious attachments or links or both. Clicking on either the malicious attachment or link infects the computer used by the email receiver with malicious software (malware) leading to the stealing of sensitive data. The adoption of VoIP in the early 2000s as…
Read More
How to Secure the Most Common Cyberattack Initial Vectors

How to Secure the Most Common Cyberattack Initial Vectors

General, News
Cyberattackers gain access to their victims' networks by exploiting initial vectors – entry points that enable them to drop malicious software (malware).   Securing the most common cyberattack initial vectors is important in protecting your organization's network. Here are the most common cyberattack initial vectors and their corresponding cybersecurity best practices in securing them:   RDP RDP, short for Remote Desktop Protocol, is one of the most popular application-level protocols for accessing Windows workstations or Windows servers.   With the spread of the coronavirus disease 2019 (COVID-19) and the resulting government-mandated stay-at-home measures, remote working has become a new normal. This new normal, however, directly impact cybersecurity. The ransomware called "Phobos", for instance, typically leverage compromised RDP connections as an initial vector.   Kaspersky Lab reported that since the beginning…
Read More
Loyalty Programs: Hot Target for Cyber Criminals

Loyalty Programs: Hot Target for Cyber Criminals

General
Loyalty Programs: Hot Target for Cyber Criminals Cyber criminals are continually looking for new targets. In recent years, loyalty programs have become the hot target for cyber attackers. One of the least highlighted aspects of recent data breaches is how loyalty programs compromised organizations’ network security. In late November, this year, Marriottdisclosed that out of the 500 million guests affected by a 4-year long data breach, account information of 327 million guests relating to the company’s Starwood Preferred Guest (“SPG”) had been accessed by an unauthorized party. SPG is the loyalty program of Starwood Hotels & Resorts Worldwide – the hotel chain acquired by Marriott in September 2016. Early this year, Marriott completed the integration of the two companies’ loyalty programs. It’s too early to tell what would become of…
Read More
6 Basic Cyber Hygiene Practices Organizations Fail to Implement

6 Basic Cyber Hygiene Practices Organizations Fail to Implement

General
6 Basic Cyber Hygiene Practices Organizations Fail to Implement A new survey has shown that many organizations today are leaving themselves vulnerable to cyberattacks by failing to implement the basic cyber hygiene practices. The study "State of Cyber Hygiene Report" conducted by Tripwire and Dimensional Research surveyed 306 IT professionals last July 2018 to examine whether organizations are implementing the security controls that the Center for Internet Security (CIS)referred to as "Cyber Hygiene”. CIS considers the following 6 security controls as the basic cyber hygiene practices: Inventory and Control of Hardware Assets Inventory and Control of Software Assets Continuous Vulnerability Management Controlled Use of Administrative Privileges Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers Maintenance, Monitoring and Analysis of Audit Logs CIS Control 1: Inventory…
Read More

Server OS Update Key Terms

General
    BACK   Operating System The core software that a computer operates on, which acts as the basis that all other programs operate on   Security Support Periodically updated software updates that protect computers against evolving security threats   Server Virtual Space Dividing a single physical server into multiple virtual, independent environments  
Read More

What is a Server OS Update?

General
    BACK   A server system is the heart of a company's I.T. life. It often contains many, if not all company files, and acts as the central core that all company computers are connected to. A slowdown of such a system would therefore mean a slowdown of the company as a whole. Often, inefficiencies that begin to occur are caused by an aging operating system (OS), which inhibits the utilization efficiency of a server's components.   An OS is the fundamental program of a computer system. It acts as the interface between the components of a computer and its user, and acts as the ground on which other programs operate. However, like any other program, it requires constant updates from its developer to keep up with new components…
Read More

Data Storage Management Key Terms

General
  BACK Corrupted Data The inability to access previously stored data due to errors and inconsistencies that occur during reading or writing processes   Cloud-based backup systems Data backup strategy involving online storage and recovery of important information   Off-site redundancies Storage strategy that involves keeping copies of important data at a secondary location   Hardware Failure Loss of information due to the physical damage of computer components  
Read More

What is Data Storage Management?

General
  BACK   By nature, digital information will always be vulnerable to data loss. This can be through physical damage of computer hardware, digital corruption which occurs during regular reading and writing processes, or accidental deletion of company files. Loss of important information in a corporate setting can often result in devastating blows to the productivity of a company. Furthermore, if improper storage protocols were implemented prior to the event, there is often the potential for permanent data loss.   GenX provides numerous services to assist your company in setting up optimal data protection and storage strategies, to give you the peace of mind that your information will not be destroyed. Not only do we offer local solutions for employee computers, such as external hard drive backup protection, but our…
Read More