Connections Blog
Email phishing is now the top ransomware attack vector
Ransomware attacks throughout 2020 were devastating and seemed to indicate that this form of cyberattack was on a continued upward trajectory. Ryuk, for example, extracted an enormous $34...
Small is Beautiful: How reducing your attack surface can prevent cyberattacks before they happen
Back in the good old days, cybersecurity used to be simple. Fine, never ‘simple’, but certainly less overwhelming than it is today. Networks and environments had vulnerabilities, for sure,...
Are you a Spotify user?
Over 300,000 thousand Spotify users may have had their data exposed and experienced disruption to their account during a credential stuffing attack in July this year. Up to 350,000...
Cybersecurity During the Holidays
As we start to gear up for the holidays after a tough year, it would be nice to stop worrying about things like cybersecurity for a while. However it isn’t just Santa and his elves who are...
Automation, automation and more automation
RPA, machine learning, AI and more tools to automate your day While not quite at Matrix or Terminator levels yet, artificial intelligence (AI) and automated processes are...
Safewords for CEOs
When most organizations think about computer hacking, it tends to be in high-level, advanced technology terms. Screens of green cascading code, Matrix-style, and the most sophisticated...
Microsoft says goodbye to Office 2010 and ushers in the age of Office 365
As of Tuesday night, Mac users have received their final security updates for Office 2010 and 2016. Microsoft has now removed the suites from their support list and is urging customers to...
Industry-specific managed services for the construction industry
Running a successful construction company is not just about getting things built. Technology is a huge part of any construction business, vital for planning and organization. For...
Is TikTok a hacker’s dream?
Viral videos, dance challenges and...cyber crime? More than just dancing teens and lip syncing, persistent security concerns about social media apps mean that companies may need to take...
How voice technology is an alternative to touching your keyboard
Did you know that your keyboard is filthy? Not YOUR keyboard in particular, but everyone’s? We touch our computer keyboards, tablets and phones all the time, and yet it is rare that we...
Cyberattacks: a matter of life and death
Last week the College of Nurses in Ontario was hit by a ransomware cyberattack that threatened to compromise personal data and sensitive information from patients and employees alike. Now,...
Canadian Government ‘shut down’ by cyber attack
The Canadian Government came under serious and sustained cyber attack over the weekend, and was forced to shut down the majority of its online portals as a result. Over 300,000 individual...