Blog

Gamers Beware! Hackers are Targeting You.

Gamers haven’t really been the focus of cybersecurity for a long time. You mostly hear about attacks on businesses. Or stolen personal data due to phishing attacks. But gamers are not safe from hackers targeting them. As cyberattacks continue to escalate, gamers have become prime hacking targets. Malicious actors seek…

Read more

Need to Show the Tangible Value of Cybersecurity? Here’s How

You cannot overstate the importance of cybersecurity. Especially in an era dominated by digital advancements. Businesses and organizations are increasingly reliant on technology to drive operations. This makes them more susceptible to cyber threats. 66% of small businesses are concerned about cybersecurity risk. Forty-seven percent lack the understanding to protect…

Read more

How Could Your Business Be Impacted by the New SEC Cybersecurity Requirements?

Cybersecurity has become paramount for businesses across the globe. As technology advances, so do the threats. Recognizing this, the U.S. Securities and Exchange Commission (SEC) has introduced new rules. They revolve around cybersecurity. These new requirements are set to significantly impact businesses. These rules are a response to the growing…

Read more

How to Organize Your Cybersecurity Strategy into Left and Right of Boom

In the pulsating digital landscape, every click and keystroke echoes through cyberspace. The battle for data security rages on. Businesses stand as both guardians and targets. Unseen adversaries covet their digital assets. To navigate this treacherous terrain takes a two-pronged approach. Businesses must arm themselves with a sophisticated arsenal of…

Read more

Coolest Smart Gadgets at Europe’s Biggest Tech Trade Show (IFA)

Every year, tech enthusiasts eagerly anticipate Europe's most prominent technology trade show. It’s the Internationale Funkausstellung Berlin, or simply IFA. This is a showcase of the latest and greatest innovations in consumer electronics. The show includes everything from cutting-edge smartphones to futuristic smart home gadgets. IFA never fails to impress.…

Read more

What is Zero-Click Malware? How Do You Fight It?

In today's digital landscape, cybersecurity threats continue to evolve. They pose significant risks to individuals and organizations alike. One such threat gaining prominence is zero-click malware. This insidious form of malware requires no user interaction. It can silently compromise devices and networks. One example of this type of attack happened…

Read more

7 Advantages of Adopting a Defense-in-Depth Cybersecurity Strategy

Cybersecurity threats are becoming increasingly sophisticated and prevalent. In 2022, ransomware attacks jumped by 93%. The introduction of ChatGPT will only increase the potential damage of cyber-attacks. Protecting sensitive data and systems requires a comprehensive approach. One that goes beyond a single security solution. This is where a defense-in-depth cybersecurity…

Read more

Windows 10 still susceptible to IE vulnerabilities

Even though Microsoft pushed Internet Explorer to the sidelines in the new Windows 10, favouring instead their Microsoft Edge browser, it doesn't seem to have helped insulate the operating system from vulnerabilities in IE. Microsoft last week released a patch for the latest bug (which our CompuCARE automated management software has already pushed…

Read more

What you need to know about XcodeGhost, the new iOS malware

Researches discovered last week a major iOS malware, called XcodeGhost. It infected hundreds of App Store apps, including popular titles such as CamCard CamScanner PDFReader WeChat WinZip According to Reuters, "It is the first reported case of large numbers of malicious software programs making their way past Apple's stringent app…

Read more

Microsoft patches up IE flaw that gives hackers access to your PC – via Engadget

In surveys, internet experts consistently report installing critical updates as the most important step they take to stay secure. Here's another example of why you should make sure you're getting updates regularly Microsoft has issued a critical update to patch up an Internet Explorer hole that can give hackers access…

Read more

Grabit Cyber-Spying Threat Targets Small Businesses – How to Keep Your Small Biz Safe

Recently Kaspersky Lab discovered a cyber-spying campaign called Grabit that specifically targets SMBs. Grabit has already been able to steal around 10,000 files from small and medium-sized businesses in Thailand, India, the United States, and other countries. They have been targeting a range of industries, stealing passwords, emails and usernames from accounts…

Read more

Apple’s fixed a serious OS X security flaw, but only for Yosemite users

Apple has announced that it found a serious security flaw in OS X, but will only fix it for users of the latest version. If you aren't running Yosemite, which was updated yesterday with the relevant patch, then you'd better get it, and quick. http://www.engadget.com/2015/04/10/osx-security-flaw/?ncid=txtlnkusaolp00000602

Read more

PlentyofFish hit with $48K fine relating to Canada’s anti-spam law – National | Globalnews.ca

The CRTC strikes again Another major fine under the Canadian Anti-Spam Law (CASL) Online dating website Plenty of Fish has coughed up $48,000 for allegedly violating the country’s anti-spam legislation, according to the Canadian Radio-television and Telecommunications Commission (CRTC). The fine stems from an alleged violation that happened between July 1 and Oct. 8,…

Read more

Thinking of switching to VoIP but worried about network quality? Don’t be.

Over the past few years, we've helped lots of clients switch to VoIP phone systems. While the reasons for making the switch vary widely, the primary concerns are always the same: Quality and reliability. Our friends at Software Advice recently surveyed 200 respondents using VoIP for business, and asked them about…

Read more

Michael Geist: Rightscorp Misleading Internet Subscribers With ‘$150,000 Fine’ Claim

New Canadian legislation came into effect on January 1. It allows copyright-holders to require ISPs to identify downloaders of copyrighted material, and send notifications on the copyright-holder's behalf. But the users' names are personal information remain confidential, and are not revealed to the rights holders. Already, the legislation has led to abuse: BMG…

Read more

Introducing CompuCARE Baseline

Looking for reliability, security, and access to a helpdesk, without monthly support fees? For years, we've been offering our clients complete management and support packages through our CompuCARE services. Starting at just $30/month per user, these plans include unlimited remote support, allowing our clients to treat our outsourced team as…

Read more

3 Reasons this fall’s Home Depot attack is relevant to your SME

Home Depot lost information for 56 million cards By now, you've probably heard of - and forgotten - Home Depot's security breach, announced this past fall. You probably know that 56 million payment cards were compromised in an attack that began in April but wasn't detected until September. And you…

Read more

“Huge” new vulnerability in Windows – Get the patch now!

Windows yesterday published a critical security bulletin addressing a vulnerability that, according to researches at IBM, has been "sitting in plain sight." Microsoft has also released an update to patch the vulnerability. IBM reported the bug privately to Microsoft in May, noting that it "could allow remote code execution if an attacker sends"…

Read more

Save 65% on 1 Year of HostGator Web Hosting + Free Domain Name – via Lifehacker

At Compumatik, we strive to be the single partner for everything your company needs relating to IT, and that includes web-hosting. Sometimes we do it ourselves, and sometimes we work with partners like Hostgator, depending on your needs. But sometimes, you just want to DIY (do-it-yourself). In that spirit, we're…

Read more

Massive list of Dropbox credentials leaked, change your password immediately [Update] – Neowin

Update: Dropbox has once again stated that their service has not been hacked but rather the list of credentials leaked came from a different service. And people are now trying to exploit that list by logging into different website where users re-used their passwords. What this means is that users who re-use…

Read more

Word not showing spaces or line returns until next character is typed

We ran into a strange problem today, and thought we'd share the solution. The Problem When you enter a space, a line return, or other paragraph mark, nothing happens until you enter the next character. For instance, you type "This is not working.", then <space>, but the cursor is still…

Read more

Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

Microsoft is targeting EMET more at system administrators, but any Windows user can use EMET to quickly enable some additional security features without any special knowledge. This tool can even help secure outdated Windows XP systems. via Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).

Read more

Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience Toolkit (EMET)

Microsoft's Enhanced Mitigation Experience Toolkit (EMET) is targeted toward system administrators, but you can get some tips on using it to secure your personal system over at the How-To Geek. You can also get the complete user's guide on Microsoft's website. Quickly Secure Your Computer With Microsoft’s Enhanced Mitigation Experience…

Read more

Browse securely with a password manager

Passwords and security Today we’re going to look at an important subject in today’s world of online interaction: Passwords, and how to improve your online security. Life is increasingly becoming virtualized, and we lock down this virtual world of emails, shopping, and banking, with passwords that we have to enter each…

Read more

Critical Internet Explorer vulnerability

What is Operation Clandestine Fox? Last weekend an internet research lab announced a new security vulnerability in Internet Explorer. According to FireEye Labs, hackers have been taking advantage of the bug in targeted attacks of American websites. The security flaw affects version 6 to 11 of Internet Explorer through a…

Read more

Why you need 2-step authentication, and how to enable it

  My wife and I woke up this morning to find an email from a good friend of ours, sent at 3:09AM, with the subject: URGENT! Needless to say, we were worried. This is what the email said:   Am so sorry to bother you, am in a terrible situation right now…

Read more

10 Top Password and Cyber Security Tips for Every Small Business

As a small business you might be thinking, “this only happens to the big companies with LOTS of information”. You’re wrong. Small Biz Technology had a great post last week about cyber security for small businesses. It was short and to-the-point, so I won't repeat the whole thing here, but…

Read more