THREAT LANDSCAPE REPORT Q1 2017

| August 23, 2017

article image
THREAT LANDSCAPE REPORT Q1 2017. ATTACK TOOLS— ANYWHERE ANYTIME SERVICE. RANSOMWARE EXPANDS AUTOMATIC ATTACKS Almost 10% of organizations detected ransomware activity last quarter Malicious ransomware like WannaCry can scale-out to hundreds of organizations across the world at onc.

Spotlight

WestGrid

WestGrid is one of four regional organizations working in partnership with Compute Canada. WestGrid brings together advanced research computing facilities, research data management services, and a network of technical experts to serve a user community of researchers across the country. WestGrid's users range in discipline from the sciences and engineering to arts and humanities. As one of Compute Canada’s largest regional organizations, WestGrid works collaboratively with 15 partner institutions across British Columbia, Alberta, Saskatchewan and Manitoba. Together with the other regional organizations, WestGrid is helping Compute Canada lead the acceleration of research innovation.

OTHER ARTICLES

5 Benefits of Investing in Cyber Security & IT solutions in 2021

Article | June 2, 2021

Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that cyber-attacks can affect the most solid of businesses and create PR nightmares for brands built painstakingly over the years. Investing in cyber security training, cyber security advisory services and the right kind of IT support products, has therefore, become imperative in 2021. Investing in cyber security infrastructure, cyber security certification for employees and IT solutions safeguards businesses from a whole spectrum of security risks, ransomware, spyware, and adware. Ransomware refers to malicious software that bars users from accessing their computer system, whereas adware is a computer virus that is one of the most common methods of infecting a computer system with a virus. Spyware spies on you and your business activities while extracting useful information. Add social engineering, security breaches and compromises to your network security into the mix, and you have a lethal cocktail.

Read More

DOCUMENT PROOFREADING AND EDITING SERVICES FOR YOUR CYBERSECURITY POLICY

Article | June 2, 2021

Recent data breaches, ransomware, and malware trends have increased the need to protect customer privacy. Regardless of company size or industry, you need a cybersecurity policy to ensure cybersecurity best practices in your organization. A cybersecurity policy contains preventive measures that protect your network from cybercriminals. To ensure that your cybersecurity policy is easy to read, understand, and implement, you need cybersecurity policy document proofreading and editing services. Your cybersecurity policy spells out cybersecurity dos and don’ts drafted from industry and state regulations that your employees should follow. It states the instructions your employees should follow to prevent cyberattacks and how they should react when they notice a network security breach. This protects data, promotes customer privacy, and prevents cyber-attacks. In this article, we spell out why you need cybersecurity proofreading and editing services.

Read More
DATA SECURITY

What Is Mac Malware, How It Penetrates Your Device, and How to Get Rid of It

Article | June 2, 2021

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I may say that there are plenty of nasty malware types like adware that open new tabs in your browser, redirect you to irrelevant pages and show numerous popups. Yes, these are not real viruses. Adware like Search Marquis cannot clone itself and infect other connected devices. It cannot encrypt your files or cause any other harm. Its activity is related only to web redirects and excessive advertising. At the same time, who knows which rogue websites adware may land you on next time. It may happen that you end up on a phishing website where cyber crooks harvest personal information that leads to identity theft. Fake antiviruses I strongly recommend removing all adware that penetrated your device. But there is a problem here. If you want to get rid of Mac adware, you cannot quickly find a solution. If you go to google and search there how to get rid of Mac malware, you will see that all top results offer you to buy and install some shady software. In reality, these Mac antiviruses do nothing, as we know that the Apple ecosystem does not allow apps to access other apps' data. No antivirus can really scan and check your files. How to remove Mac malware Solution 1: If your system is infected with adware and you do not know how to get rid of it, you may try to call Apple and ask what to do. You can find their phone number here: support.apple.com/en-gb/HT201232#us-ca. Solution 2: Another option is to try your luck on Apple communities. Thousands of tech enthusiasts help uses with their problems there. Here is a sample thread: discussions.apple.com/thread/8226644. Solution 3: There are other options too. Apple operating systems are not very difficult to use, and any person can remove adware manually by going through step-by-step guides posted on numerous malware removal websites. Here is a guide by BitAdvisors.com on how to remove Search Marquis malware. Most rogue software works by exploiting bugs and vulnerabilities in your computer's operating system. And macOS has its own bugs too. To fix these vulnerabilities, Apple periodically releases operating system updates. To date, macOS has not proved attractive enough for cybercriminals and evil developers to flood it with malware. Protection tips To stays away from any surprises, it is recommended to update your OS as well as all apps installed regularly. You should never install apps from unofficial app stores not controlled by Apple. One of the ways for adware to penetrate your Mac computer is through bundled installs. You download and install a very useful app that is often free, but in reality, you get several apps. People never read user agreements written in small print. There it can be noted that you agree to install additional tools and provide some rights to them. Whenever you install something, be careful and read user agreements, and do not miss additional unnecessary software. Do not install any software without urgent necessity. Any additional software widens the attack surface. To be able to do bad things, current Mac malware requires users to perform some actions – grant rights. So, be careful with allowing any app to access your data, change settings, etc. One more wise move is to make backups. iCloud or ordinary flash drives will help you not lose your data in case of a system glitch or malware attack. Final advice - do use VPNs. Your connection will be encrypted, and attackers will not be able to find where you are actually located or what data your traffic consists of.

Read More

We Need to Improve Cybersecurity Standards in Space

Article | June 2, 2021

Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of the end of January, the company had 242 satellites orbiting the planet with plans to launch 42,000 over the next decade. This is part of its ambitious project to provide internet access across the globe. The race to put satellites in space is on, with Amazon, UK-based OneWeb and other companies chomping at the bit to place thousands of satellites in orbit in the coming months. These new satellites have the potential to revolutionise many aspects of everyday life – from bringing internet access to remote corners of the globe to monitoring the environment and improving global navigation systems. Amid all the fanfare, a critical danger has flown under the radar: the lack of cybersecurity standards and regulations for commercial satellites, in the US and internationally. As a scholar who studies cyber conflict, I’m keenly aware that this, coupled with satellites’ complex supply chains and layers of stakeholders, leaves them highly vulnerable to cyberattacks.

Read More

Spotlight

WestGrid

WestGrid is one of four regional organizations working in partnership with Compute Canada. WestGrid brings together advanced research computing facilities, research data management services, and a network of technical experts to serve a user community of researchers across the country. WestGrid's users range in discipline from the sciences and engineering to arts and humanities. As one of Compute Canada’s largest regional organizations, WestGrid works collaboratively with 15 partner institutions across British Columbia, Alberta, Saskatchewan and Manitoba. Together with the other regional organizations, WestGrid is helping Compute Canada lead the acceleration of research innovation.

Events