CarefreeIT News

Stay updated on the latest news in cybersecurity, technology, and more

How To Spot A Phishing Attack

How To Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing sites every month, a 65% increase in attacks in the last year, and hackers would have moved on to their next idea for swindling people out of their identities and money.

What Is Phishing & How Are Hackers Using It?

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased 65% in the last year.

Cybersecurity Assessments

Businesses of all sectors and sizes use digital technologies to store confidential information, from employees’ personal credentials to customers’ credit card numbers—and that’s just the beginning. Unfortunately, handling sensitive data always poses a security risk, since business owners and their employees are responsible for protecting it from leaks and breaches.

Report from the FireEye Cyber Defense Summit

Report from the FireEye Cyber Defense Summit

Last week I attended the FireEye Cyber Defense Summit in Las Vegas. For those of you not familiar with FireEye, they are one of the premier cybersecurity companies in the world. FireEye provides cybersecurity services, consulting, and tools to organizations in both the public and private sectors.

CarefreeIT Cybersecurity Blog Series: The Internet of Things

It’s no secret that the spaces in which we live and work are becoming increasingly connected and digitized. A key aspect of this transformation has been the ever-growing slew of “smart devices” in our homes and businesses, whether they be televisions, thermostats, digital assistants, or fitness trackers—among many others.

CarefreeIT Cybersecurity Blog Series: Social Media

There’s no question that social media platforms have transformed how we share information about ourselves and our businesses. It is estimated that 2 billion people worldwide have at least one social media account, with the average web user spending two hours per day browsing networking websites such as Facebook, Twitter, Instagram, and LinkedIn. In addition to helping us connect with family and friends from all over the world, establishing a brand presence on these websites has become an integral part of consumer outreach, business networking, and marketing operations for industry professionals across all sectors.

Cybersecurity Blog Series: Ransomware

Ransomware attacks continue to grab headlines in Canada and across the globe every week, targeting organizations in education, healthcare, financial services, and everything in between. In its most basic sense, ransomware is a type of malware that encrypts data so it cannot be accessed until a set ransom amount has been paid by the victim, often in the form of a cryptocurrency called Bitcoin.

Cybersecurity Blog Series: Security Legislation

It’s no secret that new cybersecurity threats are emerging every day, while familiar ones wreak new kinds of havoc for businesses and individual web users. In response, governments from across the globe have been implementing regulations, such as the far-reaching European Union General Data Protection Regulation (GDPR), that prescribe uniform cybersecurity standards for organizations across all sectors.

Cybersecurity Blog Series: Social Engineering

It seems that every day we see another headline announcing that a prominent company or public organization has been compromised by a cybersecurity breach, losing sensitive data, public trust, and hundreds of thousands (or even millions) of dollars in the process.