Author: Adam Bishop

  • How Password Encryption Works

    How Password Encryption Works

    Maintaining strong password protection within a business is essential to secure sensitive data, uphold customer confidence, and avert potentially expensive security incidents. Encryption makes your password unreadable and unusable by hackers, protecting it both on servers and during internet transmission. Imagine creating a strong password, but it’s stored in plain text on a server. If a…

  • How to Spot a Business Email Compromise Scam

    How to Spot a Business Email Compromise Scam

    Business Email Compromise (BEC) scams are a significant threat, where criminals impersonate your boss or coworker to trick you into sending money or sensitive information. These scams are highly lucrative, with the FBI reporting losses of $26 billion annually. Understanding how these scams work and how to identify them is crucial for anyone working in…

  • Canada sees rise in cybersecurity standards amid growing ransomware threats

    Canada sees rise in cybersecurity standards amid growing ransomware threats

    The ransomware business is thriving in Canada, with recent victims including large corporations like London Drugs, the City of Hamilton, and the government of Newfoundland and Labrador. Cybercriminals, who often boast about their attacks on the dark web, do not discriminate in their targets, which have included a B.C. library network, the First Nations Health…