
Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)
The Challenge of Securing Microsoft’s Remote Access Solutions For decades, Remote Desktop Protocol (RDP) software has been used to connect to users and computers remotely. Recently, the number of implementations has increased ten-fold as organizations responded to the global pandemic and the need to work remotely was a requirement of survival. Organizations of all sizes, including those that already had remote access solutions in place, … Continue reading Properly Securing Commonly Used Remote Access Technologies (RDP/RDG and VPN)→

Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work
What is Virtual Private Networking? A Virtual Private Network (VPN) is a remote access tool used by most organizations to allow employees, vendors/partners and other stakeholders access to their company’s corporate networks and resources. When configured and deployed correctly, a VPN can help ensure that access is secure. However, Cypfer has observed that in many cases VPN technologies are deployed in a manner that may increase risk to an organization by opening a doorway for cyber-attackers to exploit. What is Remote Desktop … Continue reading Remote Desktop Protocol & Virtual Private Networking: A hidden threat in the age of remote work→

CTV Your Morning – Cyberattacks and Covid 19
Daniel Tobok joined CTV’s Your Morning to discuss the importance of keeping up to date with your cyber hygiene during Covid 19. Watch the full interview here

Remote Worker Cyber Hygiene Tips
COVID–19 has slowed down business but unfortunately hasn’t slowed down cybercrime. In our new reality we need to work from home in a safe and secure way to protect both our personal and corporate data. With that said, here is a work from home security tips designed to keep you and your family safe. Be aware of phishing emails Cybercriminals are out … Continue reading Remote Worker Cyber Hygiene Tips→

Cyber Security in the Era of the Smart Home Devices
From the apps and websites we use every day to the numerous connected devices we continue to add to our homes, there are more ways than ever cybercriminals can hack your data. As we enter a more connected reality, we need to be increasingly aware that smart home and IoT (Internet of Things) devices may … Continue reading Cyber Security in the Era of the Smart Home Devices→

Ransomware in 2020
Ransomware is becoming an epidemic in the cybersecurity world, with new strains being created continuously by criminals to extort money out of unsuspecting users. Cybercriminals are becoming more and more sophisticated. From the comfort of their own homes without any physical contact, they can launch virtual kidnappings of valuable digital assets and hold them hostage … Continue reading Ransomware in 2020→

Cybersecurity in 2020
While we saw the threat landscape change in 2019 with even more sophisticated attacks, we predict 2020 to be even more extreme. More targeted ransomware – 2019 saw ransomware exploits getting highly targeted against specific businesses, as well as local government. Attackers are spending more time intelligence-gathering on their victims, to ensure they can inflict … Continue reading Cybersecurity in 2020→

City TV – Growing Concerns for an Iranian Cyber Retaliation
Cypfer CEO Daniel Tobok discusses the concern around cyber warfare from Iran with Breakfast Television Toronto’s Roger Petersen. See the full interview here.

CBC News: U.S. Bracing for Iran’s Response
Recently, Cypfer CEO Daniel Tobok sat down with CBC’s Natasha Fatah to discuss Iran’s capabilities when it comes to attacking U.S. sites and infrastructure. Natasha Fatah: A relatively unknown site in the U.S., all of a sudden has an image of President Donald Trump being punched His face is bloodied and the word Iran is … Continue reading CBC News: U.S. Bracing for Iran’s Response→

IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers
Recently, IT World Canada sat down with Managing Partner and COO Ed Dubrovsky to discuss the state of cybersecurity in 2019 and a look ahead to 2020. Dubrovsky sees some complacency in the attitude of Canadians and organizations. “We’re just accepting this is a risk,” as a result of the almost daily stories of breaches. … Continue reading IT World Canada: Cybersecurity in Canada 2019: It was an ‘awesome’ year for attackers→

Celebrating those individuals who have gone above and beyond in 2019
Cypfer was thrilled to honour our best & brightest at the 2019 Cypfer Christmas and Awards Dinner in Toronto, Ontario. The night started off with an exclusive cocktail reception followed by an awards dinner and ceremony. “Our awards are a special time when our people get the opportunity to recognize their colleagues, call out outstanding … Continue reading Celebrating those individuals who have gone above and beyond in 2019→

IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities
This week, the gang behind the Maze ransomware strain launched a public website listing victims who have yet to pay up, threatening that if no payment is received they will publish the data stolen from those companies for all to see. Ed Dubrovsky, Managing Director of Cyber Breach Response weighed in on the discussion with … Continue reading IT World Canada- Ransomware gang behind Maze adds threat of publicizing victim info to list of capabilities→

The Gift of Cyber Security for the Holidays
It’s that time of year! As staff become distracted by annual deadlines, office parties, their Christmas preparations and so on, they’re more likely to make mistakes. In their haste, they might open a link in an email that they would normally have checked, open a fun ecard from a co-worker or try and help their … Continue reading The Gift of Cyber Security for the Holidays→

Protect your business from Business Email Compromise (BEC) attacks
Business Email Compromise (BEC) attacks are a growing threat to businesses both large and small because they prey on the vulnerabilities that technology can’t patch – people. While people may be your strongest asset, when it comes to cybersecurity, they can also be your weakest link. What is Business Email Compromise? BEC, also known as … Continue reading Protect your business from Business Email Compromise (BEC) attacks→

Don’t Let Cybersecurity Spook You This Halloween
Children around the globe are getting ready to be scared and surprised this Halloween. However, scared and surprised are not how you want to run your business. During this Cybersecurity Awareness season, it’s time to be aware of cyber security intelligence and protect yourself from hackers’ tricks. Trick or Trojon – Malware for Hackoween Malware comes in all sorts of shapes and … Continue reading Don’t Let Cybersecurity Spook You This Halloween→

CTV: TransUnion breach shows rising threat of third-party cyberattacks
A cybersecurity breach at TransUnion has underscored the rising threat of third-party attacks and the difficulty of preventing them. The credit monitoring agency confirmed this week that the personal data of 37,000 Canadians was compromised when someone illegally used a legitimate business customer’s login to access TransUnion data. Daniel Tobok, CEO of Cypfer Inc., said … Continue reading CTV: TransUnion breach shows rising threat of third-party cyberattacks→

IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders
IT World Canada recently interviewed Managing Director of Cyber Breach Response Ed Dubrovsky on the importance of understanding the state of cyber security during this important Cyber Security Awareness Month and how organizations should be prepared. Read part of the article below. “According to Ed Dubrovsky, managing director for cyber breach response at the Toronto-based … Continue reading IT World Canada: Cyber Security Awareness Month: Attackers are hungrier than defenders→

As Seen in Forbes: Spearphishing – A Story Behind The Numbers
It’s hard to read about cybercrime without seeing the term “phishing.” This is where a hacker sends you a seemingly legitimate link, from a seemingly legitimate source. The problem, of course, being that the link in question was created for the sole purpose of stealing your money or your data. This type of crime has … Continue reading As Seen in Forbes: Spearphishing – A Story Behind The Numbers→
The Globe and Mail: How to protect your business after a data breach
How should businesses prepare to deal with the consequences of a data breach if a hacker succeeds in compromising confidential data? Cypfer CEO Daniel Tobok sits down with The Globe and Mail to provide more details on the steps you should take. Read more

Ransomware – An introduction and evolving trends
Ransomware attacks are growing more sophisticated by the day. The spelling and grammar issues that once alerted us to phishing emails are all but gone. Today, ransomware technologies are not only more sophisticated but more accessible, too. Just as cybercriminals adjust their attacks based on the changing security landscape, organizations need to be able to … Continue reading Ransomware – An introduction and evolving trends→
Experiencing a breach? Contact us today! |