Learn how our online Internet Security Course can help keep your organization safe from cyber criminals.
Click here to view a demo of the course.
Click here for more information or contact us at 416-358-7498 or email us at firstname.lastname@example.org
Below are articles from our Cyber Security Newsletter.
Newsletter #9 -December 15, 2016
Must Read for All Android Smartphone Users: A new Android malware, known as Gooligan, has breached more than 1 Million Google accounts and is infecting around 13,000 devices every day.
The malware hijacks your Google account and accesses your information from Google apps such as Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite. It will also buys apps from Google Play Store and write reviews on your behalf as the owner of the phone.
CheckPoint security researchers, who uncovered the malware, says anyone running an older version of the Android operating system, including Android 4.x (Jelly Bean, KitKat) and 5.x, (Lollipop) is most at risk. This accounts for about 75% of Android devices in use today.
If you are an Android user, Check Point has an online tool available – Gooligan Checker – that will let you know if your Android device has been infected. Adrian Ludwig, Google’s director of Android security, recommends that you switch off your device and contact a professional if you have been impacted. Running a clean installation of the operating system on your Android device will fix the problem.
To keep you and your organization safe from cyber crime, more and more companies plan on educating their staff on how to recognize a malicious email or scam.
Newsletter #8 -December 6, 2016
Protect Yourself from Cyber-Crime this Holiday Season: A recent study by JC Williams Group Ltd. found 92% of Canadians shop online. Convenience, comparison shopping and product selection are some of the reasons why online shopping is so popular, particularly around the gift giving season.
When we surf the net, we put ourselves at risk. Minimize the likelihood of having your money, data or identity stolen by keeping the following cyber safety tips in mind this holiday season:
• Use a secure internet connection when making a purchase.
• Resist the urge to shop when using public WiFi, like when at your favorite coffee shop or at the airport.
• Shop only on sites that take secure payment methods, like credit cards or PayPal. Never send cash or a cheque.
• Change your shopping passwords often.
• Don’t use the same password for more than one account.
• When on an auction site like eBay, check out experiences others have had with that seller by reading comments.
• Beware of fake shopping apps- download the app by going directly to the company’s website.
Newsletter #7 -November 28, 2016
The Verizon Data Breach Investigations Report is a document containing up-to-date information related to cyber-crime. Data for the 2016 report was obtained from examining 100,000 incidents, including 2,260 confirmed data breaches across 82 countries.
This report contains crucial facts that CEO’s, CIO’s and CMO’s, as well as those responsible for ensuring an informed workforce, such as Human Resources leaders, need to know. In our continued efforts to keep you up-to-date on how to keep your workplace safe from cyber criminals, over the next couple of weeks we will be highlighting key pieces of information from this report.
For example, did you know that 63% of confirmed data breaches were the result of weak or stolen passwords? That is why in 94% of cases, it took attackers only minutes (or less) to infiltrate a security because when you have the KEY – the password – it’s easy to get in.
Our Internet Security Course for Employees includes a section on passwords (do’s and don’ts) and a great deal of other critical information to help ensure your organization doesn’t become the next victim of cyber-crime.
Newsletter #6 – November 10, 2016
The Cost of a Security Breach to Small, Medium and Large Organizations:
It is no secret that cyber crime is on the rise. But do you have any idea of how much a security breach is likely to cost your organization? In a recent study, Kapersky Labs found that the average cost of a security breach for small to medium-sized companies has now risen to $86,500. The average cost of a security breach for large companies is almost 10 times that amount at $861,000.
The amount of time it takes your IT staff to detect and resolve a breach greatly impacts the cost to your organization. Breaches detected immediately cost small to medium-sized businesses about $28,000 and large businesses $105,000. A lag time of even seven days increases the cost to $105,000 and $393,000 respectively.
The % of budget typically allocated to prevent security breaches is 18% for a small to medium-sized company and 21% for a large company. However, more money spent does NOT always result in lowered breach costs as attacks often bypass even the most advanced security measures. Diana Kelley, executive security advisor at IBM Security, says employee training is an ideal way to reduce the risks of breaches. “Some will say that you just can’t train people to not be idiots, but I don’t believe that,” she told eWeek. “I generally believe that the more aware we are about security, the better we all are.”
Newsletter #5 – October 15, 2016
Solutions to Reduce the Likelihood of a Security Breach in Your Organization: The 2016 Ponemon Institute’s Cost of Data Breach Study reported that the cost of security breaches is rising annually. But fortunately there are solutions.
• Data breaches are now a consistent cost of doing business – accordingly, a permanent risk organizations need to be prepared for
• The biggest financial consequence to an organization after a breach is lost business – customer trust must be regained and retained
• 48% of data breaches were the result of criminal and malicious attacks – these types of breaches take the most time to detect and contain.
• The average total cost of a data breach grew from $3.8 to $4 million
• The average cost for each lost or stolen record with sensitive and confidential information increased from $154 to $158
To reduce the cost of a data breach, key recommendations included:
• Use of encryption
• Having an incident response team in place
• Employee training
After participating in an IT Security training program, your employees will be less likely to fall for scams that compromise your organization’s security. If and when a data breach does occur, the cost of these breaches are generally not as significant if training had previously taken place.
Newsletter #4 – September 14, 2016
Why even Highly SECURE Organizations Are NOT Immune from Cyber Crime: Many organizations MISTAKENLY BELIEVE that because their IT infrastructure is highly secure, protected and constantly monitored, their organization is secure. They also feel that in the unlikely event a breach occurs, due to redundancy and backups, the impact would be minimal.
The reality is, however, even in highly secure environments:
• The most sophisticated SPAM filters may occasionally let a malicious email through
• The time, effort and cost to resolve a security breach is often far greater than expected
• The risk of a breach rises significantly when employees bring their laptops and mobile devices outside the office and use public internet – any information transmitted, including passwords to access a private company server, may be compromised.
For information and sound practical tips on how to protect invaluable company data when in hotels, airports and other public spaces, click here. This article was published in the Washington Post on June 30, 2016 and in the Toronto Star on July 24, 2016.
Newsletter #3 – August 15, 2016
We hope our INTERNET SECURITY INSIGHT SERIES is addressing your organization’s cyber security concerns. This series was created to help prevent your organization from becoming the next victim of a costly (time and money) internet scam.
In our most recent communication (July 25, 2016) entitled Millennials in Your Workplace? Why They May Be Putting Your Company AT RISK!, a link to the DEMO version of our new online INTERNET SECURITY course was included. It has since come to our attention that this link was not working. We apologize for any inconvenience this may have caused.
Newsletter #2 -July 25, 2016
Millennials in Your Workplace? Why They May Be Putting Your Company AT RISK! A new report from the Society for Human Resource Management (SHRM) highlights a ‘catch 22’ scenario of having technological savvy millennials in the workplace. Despite their tech savviness, these individuals may be putting the organizations they work for at greater risk.
According to Morey Habe, a cyber security executive at BeyondTrust, “millennials in the workplace have a different perspective on the sensitivity of information, information-sharing, and the ramifications of personal data being shared within a corporate environment.”
Companies often jeopardize cyber security by assuming that their young employees are tech experts who don’t need security training. This can result in serious and often costly consequences. In addition, younger workers are often under pressure to complete their tasks quickly, which makes them more likely to skip a few common-sense security steps. Click here to read more about millennials and cyber security in the workplace.
Newsletter #1 -July 10, 2016
SECURITY BREACH – Is Your Personal Information At Risk? Security breaches at large companies such as LinkedIn, Adobe, Sony, Ashley Madison and others are increasingly common. If you have an account with any of them and want to see if your personal information has been leaked, check out ‘Have I Been Pwned’.
It’s easy, just type in your email address on the site’s homepage and hit enter. If the screen turns green, you have nothing to worry about. If the screen turns red, your email address has been found on one or more leaked lists. Scroll down to see what breached site(s) your email has been found on, when the leak occurred, what personal information was compromised, etc.
If your email address is on a breached database, that doesn’t mean you have or will be hacked. But beware – your information may now be in malicious hands! Consider changing your passwords, particularly if like so many of us, you use the same password for many different accounts and be vigilant about phishing emails and other suspicious internet activity. As was written in an article in the Toronto Star just this weekend, Mark Zukerberg, CEO of Facebook was hacked for this reason. If a tech savvy person like Mark Zukerberg can be hacked, what chance do we have of protecting our data?
Copyright © 2016 proLearning Innovations Inc, All rights reserved.
Tel: 416-358-7498 or email@example.com