Giant Tiger made the news this month with a security breach related to a third party. The discount retailer used another company to manage customer engagement and communications. Customer data, including contact information and home addresses were compromised, leaving Giant Tiger with the task of contacting customers to warn them of phishing emails and phone calls likely to ensue as a result.
SeekingFire
Blog + News
Stopping the Leaks: How to Play Safe on Today’s Internet
Sara finds an email in her inbox, notifying her that she has been the victim of a data leak through one of her social media accounts. Brad gets a similar email, letting him know that his private information is no longer secure after his favourite online store experienced a security breach. These types of notifications are almost commonplace as cybercriminals become increasingly sophisticated in their attacks on the networks that hold our data. In fact, there have been over 26 billion records exposed in what Canadian cybersecurity researchers are terming a “supermassive leak”.
Secure Giving: Passing on your Devices, Not your Information
You’ve upgraded to the latest technology, but you still want someone to benefit from your old phone, computer, or smart tablet. Maybe you’re handing down that still useful iPad to the kids or your smartphone to great-aunt Joyce. Perhaps you’re donating your old...
How to Create a Comprehensive Cybersecurity Plan for Your Business
When you’re running a company, there are a lot of moving parts to consider. You may be managing inventory and operations, delegating tasks to various departments, and ensuring efforts are coordinated to streamline your processes. At the same time, you want to make sure that information required to keep your company functional is protected from outside threats. To do this, you need a cybersecurity plan.
Today’s hackers are sophisticated and organized
Often, we think of hackers as loners getting up to mischief in a basement apartment somewhere. We don’t think of them as big business — but they are!
Today’s hackers are often part of a large organization with sophisticated means of stealing data from customers and employees of companies big and small. Most insidious are ransomware disguised as software programs and plugins. They work from the inside out, creating backdoors that can rob you of sensitive data for a year or more before they are even detected.
Data Security: Getting Your Team on Board
Data security is everyone’s responsibility in the workplace. Commitment to keeping your information safe can’t be handed off to your IT Team. While they may be responsible for alerting management and initiating a cohesive response to a cyberattack, the bulldog guarding the front door is every member of your organization using the company’s computers and mobile devices to conduct business.
Don’t let the cybersecurity Grinch ruin your Christmas
With the festive season upon us, we're here with a friendly reminder: Don't let the cybersecurity Grinch ruin your Christmas fun! There's never a good time for a data breach, but some times are certainly more inconvenient and disheartening than others. The best thing...
Canada’s National Cyber Threat Assessment for 2023-2024 published
Canada's technical authority on cybersecurity, the Canadian Centre for Cyber Security, has published its National Cyber Threat Assessment 2023-2024. Working in collaboration with the Government of Canada, Canadian businesses, international partners and critical...
Five Eyes, including Canada, issue joint cybersecurity advisory
In the words of Smash Mouth, "the years start comin', and they don't stop comin'..." The same could be said of cybersecurity threats. They are coming from all angles all of the time, but the good news is that you can be a cybersecurity "All Star." Bet you didn't...
Is your Wi-Fi network as safe as it could be?
87% of consumers put their information at risk while using public Wi-Fi. Source: 2017 Norton Wi-Fi Risk Report, Norton by Symantec, 2018
Protect your customers and your reputation
85% of organizations are the target of social engineering attacks, like phishing. Source: The Cost of Cybercrime, Accenture Security, 2019
We've got your back!
We know the information security space can be a little intimidating, but we’ve got your back. We offer no-judgement solutions to a wide range of cybersecurity challenges. Contact us for a custom quote. [Hyperlink]
Malware attacks can be very costly. Are you protected?
Malware attacks cost organizations an average of $3.4 million each year. Source: The Cost of Cybercrime, Accenture Security, 2019
The Internet is basically our best friend (or at least connects us to our BFFs)!
91% of Canadians aged 15+ use the Internet. Source: Canadian Internet Use Survey, Statistics Canada, 2019
Canadians spend over 40 billion hours a year online
73% of Canadians spend at least 3-4 hours online per day. Source: Canada’s Internet Factbook, Canadian Internet Registration Authority, 2019.