Author - Travis Newton

KRACK: Your wireless network is at risk!

The other day a massive vulnerability was discovered in WPA2 wireless encryption which secures just about every wireless network – from the one in homes, to your office, to even your favourite coffee shop where you have to ask the barista for the daily wifi password. Every OS – Windows, macOS, Linux, Apple iOS, Android – are all susceptible to this attack. This attack is called KRACK which stands for Key Reinstallation Attack. This attack can be used to read data transmitted between [...]

Read more...

The Changing Face of Cybercrime – Know Your Enemy

As a cybersecurity professional, you are the guardian of data, the gate keeper, and the architect of defense. You live on the front lines of a digital battle against invisible enemies and advanced persistent threats. It’s your job is to find and protect any possible vulnerability or weakness that could be exploited anywhere in your organization at any time—24/7/365. Your enemy’s job is to find one weakness. Just one! Your enemy will exploit your infrastructure, your people, and anyone connected to you [...]

Read more...

Work smarter with Windows 10 and virtual desktop

Windows 10 is without a doubt one of the most popular operating systems released by Microsoft. Did you know that Microsoft made it even easier to multitask in this already powerful operating system? We’re going to take a look at virtual desktops, one of the most long awaited features of Windows and something that operating systems like Linux® and macOS® have had for years. Multitask with Task View There’s an icon many people overlook when they use their desktop. It’s right [...]

Read more...

Going Virtual: The Security Considerations of Public vs. Private Cloud

Cloud computing can bring significant benefits to your IT operation, but it can also carry some security risks, so organizations need to understand how they can take advantage of all it has to offer without putting their data at risk. This article describes how to develop a cloud-based computing strategy that mixes scalability with security. Two main factors that attract companies to the cloud: the first is its potential for cost efficiency. Eliminating the capital expenditure on local servers can [...]

Read more...

VMware vs Hyper-V—Which Virtual Infrastructure Should You Choose

VMware vSphere® and Microsoft® Hyper-V® are both enterprise-class hypervisors, and the question of which hypervisor is better has been hotly debated over the past several years. Asking someone which hypervisor is better is a lot like asking someone whether a PC or Mac® computer is better. The answer is likely to be based on personal biases, when in reality, both PCs and Mac computers are very capable. The same is largely true of vSphere® and Hyper-V. Both are excellent [...]

Read more...

Beware: Mac Malware Is on the Rise

For the longest time, there has been an assumption amongst many Mac® users that their operating system of choice is secured against the malware threat. While there may have been some truth to this a few years back, it certainly isn’t the case anymore. Today, there are a growing number of active threats targeting macOS®. Perhaps more importantly, as the popularity of the platform grows, so does the amount of malware emerging from the shadows. A Growing Market and Threat According [...]

Read more...

Windows 10 Fall Creators Update Release Announced

Mark your calendars for October 17th as that is when Microsoft will be releasing the Fall Creators Update to the general public. There are lot’s of exciting new features announced but perhaps one of the most anticipated features is OneDrive Files On-Demand. With portable devices having limited storage space, it can be a pain to have OneDrive eat up all of that space. Especially for businesses where often times, the size of OneDrive can easily be larger than the [...]

Read more...
JIRA Tracking System

Working effeciently with a tracking system

We work on a lot of projects both with our customers and internally as a company. Keeping track of everything is a bit of a challenge, but it doesn’t have to be. We keep our selves in check by using a tracking system (or ticketing system). It doesn’t matter if you’re a large team or small team, keeping a close eye on your projects is a big task and that’s why we’d like to open up and share with [...]

Read more...
Preventing Email Spoofing

Preventing internal email spoofing with Office 365

Email spoofing is a problem that affects companies world wide. This type of spoofing email is complex because it looks legitimate. After all, the email did appear to come from within your domain! Companies can lose millions of dollars through sophisticated phishing attacks and internal spoofing. The attacker will send an email posing as someone like the CEO. The attacker will send this email to someone, typically in the finance department, to wire money into an account. But here’s where [...]

Read more...

New Ransomeware “Nyetya” in the Wild

Cisco is calling Nyetya “WannaCry’s bad cousin” and it’s no surprise as to why. This ransomware uses PSEXEC, a very legitimate administration tool from Microsoft, and WMIC to execute it’s processes. It steal credentials and spreads through networks using EternalBlue and EternalRomance SMB 1 exploits which were patched by Microsoft in MS17-010 Machines that are patched against these exploits (with security update MS17-010) or have disabled SMBv1 are not affected by this particular spreading mechanism. Please refer to our previous blog for details on these [...]

Read more...