When ransomware attacks backups

Posted by Claude Gagne_ on Oct 30, 2019 7:45:00 AM
 

Wood Ranch was the victim of a ransom attack during the summer, and its electronic medical records were encrypted. Wood Ranch didn’t agree to pay the ransom, only to discover that their backups were also encrypted. Since it has not been able to recover its data, the company will close its doors and cease operations on December 17, 2019.

The evolution of ransomware is very similar to a cat and mouse chase.

 

 

                        
Read More

Topics: Cloud, Storage, IT security

Why and how to prevent internal IT attacks

Posted by Claude Gagne_ on Sep 16, 2019 7:42:00 AM

The case is still very much in the news and is still causing concern. Personal information, including the social insurance numbers of 2.9 million Desjardins members, was stolen by an employee of the institution.

If it wasn’t already, this confirms the seriousness of this type of IT attack from within.

In the text that follows, I use the misfortune of Desjardins to illustrate my point on IT security. Of course, there is no point in pointing the finger at this institution, since it is far from the only organization to have been the victim of internal attacks.

 

Read More

Topics: IT infrastructure, IT security

Cloud security: a shared responsibility

Posted by Claude Gagne_ on Feb 13, 2019 9:46:12 AM

A few days ago, I had a meeting with Mark, a client with whom over the years, a solid relationship of trust has developed. After a while, the conversation turned to the security of the public cloud.

Claude, as you know, our company understands the importance of using IT technology as a lever for growth. Among these technologies, the public cloud has undeniable advantages. But I ask myself questions about its security as the media is always echoing some sort of security issue.

What do you think?

Read More

Topics: Cloud, IT security

Top 7 Corporate IT security New Year’s Resolutions !

Posted by Jennifer Bridgeman_ on Jan 15, 2019 7:45:00 AM

Happy New Year! The Present team would like to take this opportunity to wish you a wonderful 2019, full of health, happiness and prosperity

The start of a new year is always an opportune moment to reflect on what we want to achieve over the next 12 months.

Read More

Topics: IT security

Securing your customer data: 7 recommendations that every SMB should apply

Posted by Claude Gagne_ on Jul 12, 2018 7:57:36 AM

We generally associate IT security breaches with the loss and theft of information due to the intrusion of hackers. Just think of the massive hack at Ashley Madison in 2017, which forced the company to negotiate with hackers or risk seeing all their confidential data published. A story similar to that of Sony, in 2014. 

 

However, especially for SMBs, it is wrong to believe that threats mainly come from the outside. In fact, 85% of corporate espionage is done by employees, from within companies

 

Read More

Topics: IT security

Quick-Anonymizer : protect your clients' data

Posted by Benoit David_ on Jun 6, 2018 11:44:00 AM

In our increasingly digital world, privacy and data security are at the heart of business operations and customer relationships.

In order to protect the identity of citizens and reduce piracy, a new law entered into force on 25 May, 2018 in Europe: the General Data Protection Regulation (GDPR). All indications are that the same type of settlement is also expected to see the light of day in North America.

It is a vast law but one aspect of it is that it requires any company, in Europe or elsewhere, that processes the personal data of European customers, to demonstrate their ability to protect their confidential information as soon as data is transferred/copied outside the production environment for training purposes, development or testing by anonymizing the data.

Read More

Topics: IBM, IT security

IT Security : Survival Guide for Spectre and Meltdown 

Posted by Benoit Mercier_ on Jan 29, 2018 12:00:00 PM

A lot of information has circulated in the last few days about Spectre and Meltdown vulnerabilities. With all that can be found on the subject, the task of protecting oneself may seem overwhelming. 

If you have not had the chance to read about these IT security flaws, our previous article discusses these two security breaches in detail.

Read More

Topics: CIO/IT leaders, IT security

9 common risk factors linked to an enterprise’s IT network

Posted by Francois Desjardins_ on Dec 12, 2017 7:45:00 AM

The IT network is a driving force for all businesses today because of the volume of information that is exchanged electronically. But, when we talk about connectivity and information sharing, we also must address the increased risk of data loss or service disruption. Breaches in the system can be disastrous. 

To find out if a sword of Damocles hangs over your business, it is important to analyze the potential risks your network faces daily. If you experience one or more of these 9 problematic situations, you should remedy it as soon as possible. Here are our recommendations.

Read More

Topics: IT infrastructure, IT security

Ruckus Cloudpath: security for wired AND wireless networks

Posted by Marc Therrien_ on Nov 1, 2017 7:45:00 AM

In recent years, IT experts have put a lot of emphasis on the importance of properly securing wireless networks. In fact, while the message has gone over well for wireless, this is far from the case for wired networks as most companies continue to neglect the protection of their LAN network. Companies are unknowingly at increased risk of being attacked or having their sensitive data accessible to anyone with a network connection at their disposal. 

 

Take for example your residential WiFi access. You most likely need a password to connect to the Internet. However, if you connect your workstation directly to your router, authentication is no longer necessary and you have immediate access to your network. This is exactly the same principle for companies. Remote access to the network is secure, but the wired entry doors within the building are unlocked when companies do not impose some form of authentication before a user can connect to the network.  

Read More

Topics: BYOD, IT infrastructure, IT security

How to evaluate your risk in the event of a disaster in 22 questions

Posted by Benoit Mercier_ on Jun 20, 2017 8:00:00 AM

Most companies take measures to protect their IT data, and with good reason. However, the increasingly critical role of IT in business models tends to increase the vulnerability of enterprises to disasters.

To help you evaluate your company’s risk level in event of a disaster, we have drawn up a questionnaire that addresses four areas related to IT security. This short survey will help you have a better idea of the consequences of a disaster on your operations, business, human resources, and your supply chain.

Answer the following questions and determine your risk level!

Read More

Topics: IT infrastructure, Disaster recovery (DR), CIO/IT leaders, IT security

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan

Recent Posts