HOW TO STAY SAFE WHEN USING PUBLIC WI-FI

May 8, 2019

Most people tend to work from remote, public locations a few times a week. If you’re akin to hanging out at your local Starbucks and prepping your sermon, you could be risking a data breach without really knowing it. One of the most common ways that hackers can access your data is through a ‘man in the middle’ attack. The hacker finds a security flaw in the cafe or shopping center’s router, and exploits it to access the data that passes between you and the hub. To reduce the chances of getting ‘man-in-the-middled’, you need to check whether the public network you want to use is secured or unsecured before you join it. A quarter of all public Wi-Fi hotspots are entirely unencrypted. So, only use networks that require a log-in and password.

Spotlight

Great Lakes Computer Corporation

Great Lakes Computer provides computer IT support to small and mid-sized businesses, including Managed Services IT Support, computer maintenance and repair, anti-virus and anti-malware computer security, managed print services, and computer network consulting services. Just need your printer repaired or plotter repaired? Give us a call and we'll have your printer or plotter system working fine in no time.

Other Infographics
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Cyber attack infographic

Infographic | December 25, 2019

Are businesses today doing enough to succeed in the battle against cyber security threats and are the traditional methods they are using the most effective?

Read More
news image

Ransomware Statistics and How to Protect Your Business

Infographic | March 9, 2022

Ransomware Is One of the Most Common Malware Threats. Average ransomware payment in 2021 increased by 82% year over year to $570,000.

Read More
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More

Spotlight

Great Lakes Computer Corporation

Great Lakes Computer provides computer IT support to small and mid-sized businesses, including Managed Services IT Support, computer maintenance and repair, anti-virus and anti-malware computer security, managed print services, and computer network consulting services. Just need your printer repaired or plotter repaired? Give us a call and we'll have your printer or plotter system working fine in no time.

Events