Resource Center
Resource Center
Expert Insights and Tools for Fortifying Your Cyber Defense
Elevate your cybersecurity expertise and strengthen the security posture of your organization with expert guidance, industry best practices, and research insights from Enterprotect.
Canadian Government Approves Cyber Security Certification for SMBs
The Canadian Federal Government recently launched a highly-anticipated program impacting small to medium-sized businesses and their current cyber posture.
Ransomware 101: Understanding the Growing Threat
Ransomware: a highly intrusive form of malware that essentially invades a victim's files and locks the user out by encrypting their system or files. As the name suggests, the attacker then demands a ransom from the victim in order to unlock the files and restore access.
I Fell For a Phishing Attack: Now What?!
Since April of 2018, Canada has experienced a drastic uptick in phishing volume, +170% (Phishlabs:2019 phishing trends and intelligent report). Ranking as the 2nd largest increase in volume globally, Canadian SMBs need to understand the depth of sophistication that attackers are using in order to EDUCATE and train employees.
Phishing 101: Discovering the Deceptive World of Phishing
Phishing is classified as a social engineering cyber attack since cyber criminals use their social skills to pose as a trusted or reputable source in order to solicit confidential information from their victim. Impostors typically use some form of email, phone or direct message in order to contact the victim and trick them into taking immediate action.
My Password Was Hacked: Now What?
Likely you’ve received a link to this article because you’ve received a notification from us telling you your password was compromised. There are a number of tools we use to detect if your password was compromised so this article won’t go into detail about the how. We will simply focus on the “Now what?”.
Password Power: Creating a Strong Defense Against Cyber Threats
In many cases, data breaches are the result of a weak or overused password. As with other methods of data breach, hackers have a laundry list of techniques to use when it comes to cracking your “well thought” defenses.
Internet of Things (IoT): A Growing Number of Backdoors Into Your Network
The internet of things(IoT) represents the continued evolution of technology as more and more of our every day devices become “smart”. Moving forward, we will begin to see everyday items become embedded with sensors, small computers, Bluetooth and Wi-Fi connections which allow them to be programmed to make our lives more productive and efficient.