Benefits and Risks of QR Codes


QR Codes Are Now Mainstream

Although QR codes have existed for over two decades, their mainstream adoption only started after the COVID-19 outbreak in 2013. Businesses needed contactless solutions that allowed customers to securely log-in, access WiFi networks and place orders without touching shared surfaces - and QR codes provided just such solutions.

QR codes have made life more convenient, yet as with any new technology they pose some cybersecurity risks that should be kept in mind. In this article we'll take a look at the most frequent threats related to QR codes as well as ways to stay safe while using them.

Hackers Can Fake QR Codes By nature, QR codes aren't human readable

They're simply...


Forget about "you can't teach an older dog new tricks


New research has unlocked an unexpected facet of cyber security risks: your younger employees who possess technological proficiency could be your biggest exposure.

Are You Shocked? Let's Get Down to Business

Survey results were alarming: Over 6,500 employees worldwide were polled with an even distribution across demographics.

Study results revealed that younger office workers (those aged 40 or under) are more likely to disregard basic password safety rules and use their birth dates as passwords, while only 19% used this tactic among those over 40!

And it doesn't stop there.

Young workers were more likely to use the same password across multiple devices than any other age group; 38% admitted doing...


Be wary of a new, devious phishing scam

temp-post-imageAnother day, another scam. Here's one that is particularly insidious.

Cyber criminals have evolved, creating increasingly intelligent malware. One such virus even impersonated an established brand to gain entry.

Email from an e-signature service widely utilized.

Email attachments will consist of an empty picture containing empty svg images carefully embedded within an HTML file (please be patient).

Clever malware that bypasses security software.

Your business could be put at risk as the code within this image redirects users to a malicious website.

By simply opening an attachment, it's possible for malware to infiltrate your device or network and put your data at risk of ransomware attacks, leavin...


The Risks & Costs of Human Error with Data Loss


Your business likely already has an extensive cyber security program in place: firewalls, anti-virus/malware protections, multi-factor authentication and data encryption. Unfortunately, people represent your greatest cyber security threat.

No one at your organization intends to put your information at risk intentionally, yet human error is more likely than malicious insiders to be the source of a data breach. Verizon's annual Data Breach Investigation Report showed that 74% of the breaches investigated involved "a human element."

Human actions often lead to data loss for businesses across the globe, which could include such risky behaviors as:

  • If you delete files without creating backup copies ...


How to Combat SaaS Ransomware


SaaS (Software as a Service) has revolutionized how businesses operate, offering convenience, scalability and efficiency - no longer do you have to drag software from device to device - cloud collaboration has made working together effortless for everyone involved.

SaaS can have its drawbacks. Software and data hosted online are more vulnerable to attack; ransomware has recently begun targeting cloud environments.

Ransomware attacks against computers, servers and mobile devices have long been ongoing. Recently however, there has been an alarmingly sudden upsurge in SaaS-based ransomware attacks.

Odaseva conducted a study in 2022 which found 51% of ransomware targeted SaaS services during March ...


Implement threat modeling techniques to lower cybersecurity risks


Businesses must remain proactive against cyber-threats as cybercriminals target sensitive data and assets. Data security threats come in many forms.

Modern offices are digitally advanced. Virtually all activities depend on technology and data exchange; hackers can gain entry through various entry points such as computers, smartphones, and cloud applications.

Cybercriminals have the capacity to penetrate an estimated 93% of corporate networks.

Threat models are one way of combatting intrusions. Cybersecurity employs this process of threat modeling; this involves identifying possible threats and vulnerabilities for an organization's systems and assets.

Threat modeling helps companies prioritize t...


Explore with peace of mind: Microsoft Edge offers enhanced protection.


Browsing the internet can be dangerous; one malicious link could compromise all of your company's data.

Cyber criminals use automated tools to launch attacks against businesses, so it is vital that you remain on top of your online security.

We're thrilled to hear that Microsoft plans on rolling out an update for Edge that will enhance security for all users.

Addition and enhancement are two different strategies used to strengthen security systems.

Password Monitor can keep an eye out for potential password compromise, alerting you immediately should any such breach take place.

SmartScreen is another technology designed to safeguard you against phishing scams, malware and other forms of malicious...