Unsupported Means Danger!

I remember when we lived in a world before computers and the internet, which meant hackers were heavy smokers…! Now we live in an age where everyone has a computer everywhere they go. From your cell phone to your computer at work or home, your gaming system, you are tied to technology! As all our technology advances so does the software that runs it and runs on it. All software …

‘Juice Jacking’ What Is It?!

As we’ve become more and more reliant on our mobile devices, we’ve become more starved for power to keep them running! Whether its in the airport, mall or wherever, we see that battery percentage drop and we start to panic!!!! I was at an outdoor mall this weekend and saw people plugging in their phones without a second thought, I wondered to myself who or what is on the other …

Corporate Virus Super Spreaders!

Sorry for my absence but there is a good and true reason for it, and you’ll find out why here. Recently I contracted a certain virus we have all become very aware of and at the same time tired of hearing about, Covid 19. As we have all spent the last couple of years learning more and more about this virus and how it morphs and spreads in different ways, …

I Am Truly Thankful!

While not close to my usual blog exactly follow me on this one, please. It may be a bit long, but I hope you get something out of it! To be Thankful. It’s 4:00 am and I was woken up an hour ago by a thought that wouldn’t let me go back to sleep! That thought is how thankful I am for so many things in my life. And being …

Random Act of Kindness

This week I’m going way off topic as something happened to make me truly thankful for all I have, including my forum to reach out here. I know Nuvollo will support me in this blog and it’s lack of anything to do with our business, because that the kind of people we are. It’s a bit long but I ask you to please read it all the way through. Thursday …

The Danger Of Doing The Right Thing!

By now we all know about Crypto Currency and its value, especially in ransomware attacks. But there is a business within the business of Crypto Currency. Cryptomining, below is a definition for those who are not familiar with it, And the blog for this week is below that! ______________________________________________________________________________________________________________________________ What Does Cryptomining Mean? By: Jennifer Seaton | Reviewed by Kuntal Chakraborty | Last updated: December 9, 2021 Cryptomining is the process of validating a cryptocurrency transaction. Cryptocurrencies like Bitcoin use …

The Fastest Predators Find Their Prey!

When you think of ransomware attacks and data breaches you don’t think of how fast your files can be gone! Knowing the facts can help you think about how to be smarter if you can’t be faster. In the article attached you’ll see how fast hackers can steal you data. How much of your valuable data can be in 100,000 files? Now ask yourself the same question but increase that …

Staying Up To Date Is Critical

We all see the dreaded “There is a software update waiting” and hesitate as long as possible to do it, or in a lot of cases just don’t do it at all. We also don’t have automatic updates turned on or manually check for software updates because it’s just a hassle! It takes time to download, then install, then reboot… But trust me it is worth the time! The reality …

Social Media And MFA

This is a very serious matter and I am speaking from a recent personal experience. Last week I received multiple messages from my MFA/2FA that someone had tried to change the password on one of my Social Media accounts! What does that mean?? We live in a very connected world these days via Social Media, for personal use, business, interests, dating etc. Some people have so many Social Media apps …

[email protected] pRoT0kOL!

This week I was helping a friend with some issues they had on their personal computer. We needed to log in to a number of their accounts to fix some issues. I was blown away at how a friend of mine could use the same password for every one of their accounts, email, social media, work… Now this is not an unusual occurrence to be sure! I decided to look …

The PERSONNEL Touch!!

Yes that is an intended play on words!!! This week I thought I’d depart just a bit from my usual blog style of the hacking/ransomware we’re all facing and write about something a bit different. I just read this great article about how job seekers are using hacks to get interviews. While it is not traditional hacking to gain access to your data, it is still someone trying to gain …

One Seriously Motivated Hacker

I read this article and was amazed at the time and dedication this hacker took to get his revenge. After he was hacked by a government he sat and lay in wait for the right moment then WHAM he took down a whole country’s internet!! I am not saying that I condone this in any way, but it proves that it doesn’t necessarily take a team of sophisticated, well funded …

HACKTIVISTS!

Definition: Hacktivism is the misuse of a computer or the internet, primarily by way of hacking into unauthorized networks, to expose a believed injustice. And that’s the premise of hacktivism: carrying out hacking attacks as a form of activism. Hacktivism is usually directed at corporate or government targets. As if things weren’t bad enough in the world of hackers and ransomware, the hacktivists are now getting in the way of serious …

Losing A War In More Ways Than One!

This week the Canadian Foreign Affairs Ministry was hacked. Which means, even though they have the money and access to technology, the cybercriminals are still winning the war. This leads to a big question of how are governments fighting this war, and are they really using all the possible assets available to them? With the political situation globally getting more tense, what will happen if the well funded hackers attack …

USB Security Practices Are Critical!

In the article attached it is clear that hackers are exploiting every possible avenue they can to gain access to your environment and lock you out! This is one of a few articles I’ve read lately about USB memory sticks as a means to get in. And they’re using the good old fashioned snail mail to deliver it! Other articles as well talk about the USB devices being sent out …

What A Massive Breach Of Privacy!

Let me start my first blog of the year by wishing everyone a Happy and Healthy New Year! As I read the article below a couple of things struck me, first is that this is an ongoing issue since December 12th, 2021, but more horrific is that 12 years of employee data was stolen! Furthermore I found it unsettling that the company feels in someway, better that no customer data …

Tis The Season!!

It’s a sad thing to think that some people might not get gifts for the holidays or be able to have the typical family celebrations!! Not because they don’t have jobs, not because they haven’t earned their pay, but because hackers hit the company that provides the software to processes the payroll has been hit with Ransomware!! These hackers make Scrooge look like a nice guy! In the article they …

5 Stages of a Ransomware Attack!

I recently read a great article about ransomware, and while it was extremely geared toward techies, I thought it would be great to simplify it for time’s sake. The first thing to understand before I go into detail is that hackers don’t wake up to find you and hit you with ransomware. It is a skilled and timed precise attack. These aren’t just kids sitting in the basement on their …

Cybersecurity Training, A Necessity and Here is Why!

Ikea is fighting what seems to be a losing battle against hackers. The reason they’re losing is that their employees need to learn how to recognize and treat Phishing emails, Spam, etc. At the same time obviously tighten up security on servers quite a bit. When I speak to clients about our Training Programs, and that they have measurable results, they see the value. What is the real value? If …

Score One For The Good Guys!

As the the continuing rash of Ransomware attacks plague us, one group has been delivered a hit that likely won’t stop them but it might slow them down! While there are still many other cybercriminal gangs out there, the group REvil was hit by a multinational task force as you can read in the article below. This might make the others realize the noose is tightening. But what does this …

Hackers Don’t Care!!

Last Thursday October 28th hackers hit the Toronto Transit Commission (TTC) with a Ransomware attack. While the TTC claimed they were not affected terribly, the users of the system suffered some discomfort. But the people who really suffered were those who use the TTC Wheel-Trans service. This service is for disabled people, it helps them get to appointments, do their shopping, etc. Without this service many people who desperately rely …

I’ve Said It Before and I’ll Say It Again, Education Is The Best Defense!

In the very electronic world we live in, email has become how we communicate more than any other in business as well as our personal life. With that being said how often do we get an email from someone we believe we know, but in reality it’s not?! Just one minor variation in the email address, such as (John vs J0hn) that we don’t notice, or better yet a ‘spoofed’ …

Phishing Season Is Open!

I can’t say I’m too surprised that in the last quarter phishing emails will be on the rise. As the article attached clearly states cyber criminals know when your guard is down! Holidays bring out the best and worst in people, Black Friday shoppers will trample each other for a big screen TV, but cyber criminals will just send you a “Coupon” for a discount on it, and when you …

Why Update Your OS?

Many things in our life work even though they may be old , cars, appliances, etc. But they don’t run off software. They are typically, if old enough just dumb devices. But you still change the oil in your old car to keep it running, I hope!? Even computers keep working for a long time after they are considered old, but you did all the updates over the years to …

Wow Labour Day Already!

Well it’s bitter sweet Labour Day is here, the end of summer, the beginning of school, and the time Cybercriminals LOVE!!! (see article below). While most of us will be enjoying a long weekend with family and friends, some people will be hard at work, HACKERS! They love these long weekends when most IT teams are off they make their attack. While they’ve been mining information about companies on the …

The Better the Lock…

When I bought my home I asked my locksmith for the “best lock available”, his answer, “the better the lock the better the lockpick”! See the article below. It seems that is true in the world of Cybercrime. The more we try to combat hackers the smarter they get. That’s not to say leave yourself open, it means armour up and protect yourself and prepare for possible recovery. We put …

What If??!!

As I have been blogging mostly about Ransomware attacks on companies, I think we should all ask ourselves ‘What If”? What if and more likely when is the question, hackers attack for example, municipal water supplies, traffic systems, etc. Hacking into a city’s water system and playing around with the chemicals that make our water safe to drink! That is a big WHAT IF! Imagine the traffic lights all turning …

Did I Lock The Back Door?

We all leave our home and instinctively lock the front door behind us, but did I leave the back door open??? Sounds simple and silly but this is how hackers get in most of the time. The front door may be locked up tight but the back door is wide opened!! What is a back door for a hacker, it could be your supplier who has weak security, could be …

Tech Support Appreciation!

We never call tech support just to say ‘hi how are you?’. No we call tech support when we need help. It could be a simple issue or it could be catastrophic!! Either way it’s because we need help, and we need it now. Usually customers who call tech support for any reason (IT, cell, TV, etc.) are friendly and polite, but sometimes they blow up from the time the …

Ransomware Attacks At All Time High!

Ransomware has overtaken as the worst act of cybercrime. The days of ‘simple’ hacking are still around, but compared to having your systems locked and inaccessible it’s nothing. There is a cost to all this that has gone mostly undiscussed. The cost of downtime, loss of business and the worst is loss of credibility with customers / clients. You’ve spent years building this trust and in one key stroke it’s …

Can You Avoid Paying the Ransom?!

While no company including Nuvollo can guarantee you 100%, you won’t have to pay a ransom to attackers, Nuvollo can certainly and confidently say we can give you a fighting chance. With our highly skilled team of Cybersecurity pros and secure back up routines, we can give you a better chance of avoiding the large financial drain of Ransomware! The best way to do so is contact us before so …

How Much Are You Willing To Lose?

It’s not just the cost of the ransom or other financial costs, which will be exorbitant! Its the downtime of your business, the lost confidence of your clients, that’s where you suffer the biggest loss! Nuvollo can help with the industry Best in Practice security, back ups, and a complete host of IT services. Our goal is keeping you up and running! (click the image to read a great article)

PARTNERING WITH NUVOLLO FOR PRIVATE CLOUD AX SERVICES

NUVOLLO INC. is a global technology company focused on providing secure private cloud  AX as a Service. HOW CAN WE HELP YOU? Reduce cost and increase efficiency by using our cloud infrastructure. Today, most organizations don’t have to spend an absorbent amount of money on purchasing and maintaining IT infrastructure (servers, storage, networks). Nor do they need to employ a large IT team to manage its local setup and day to …

Any IT issue, we will dig and hold on to the issue right until we get it fixed.

Have you ever encountered a difficult IT issue that appears almost impossible to get resolved?    We often get challenged by our clients and users that way.   It may be an application being run by an overseas group that somehow lost connectivity and does not want to connect.   Or voice quality that badly degrades a few times a week.   Or a user account that seems to get locked for no reason …

7 Reasons to Adopt ERP Software for Your Business

7 Reasons to Adopt ERP Software for Your Business With the summer, which finally arrived, it’s time to rethink our working methods. We can think about simplifying our tasks and thinking about how to automatizing repetitive tasks, what will give us more time (and of holidays?). The ERP (Enterprise Resource Planning) is a system companies’ resources planning which can bring us on this way.

Linkedin job opportunities

Connect With Us On Our LinkedIn Page !

You are dynamic, sociable and passionate? In Nuvollo, we foster initiatives, dynamic way of work and skills sharing. If you want to work for a company that is concerned with both satisfaction of its employees and clients… Nuvollo is for you! If you want the opportunity to work with emerging technology and become part of the cloud revolution, send your resume to [email protected], and connect with us on our Linkedin …

spear phishing

TECHTIP#3: How to protect you from spear phishing?

91% OF CYBERATTACKS START WITH A SPEAR-PHISHING EMAIL   Spear phishing is an email sent to you that appears to be from a person or company that you know. But it’s not. It’s from a criminal hacker who wants your credit card and bank account numbers, passwords, personal and financial information. Learn how to protect yourself and your company: Verify email addresses to be sure that it’s the real sender …

cloud

Which cloud is better for your business?

PUBLIC CLOUD A public cloud is based on shared virtualized resources. It’s owned and operated by a service provider. It works with internet connectivity only, so it’s a multiple customers’ support. The first advantage of the public cloud is the speed with which you can deploy IT resources, you can stagger compute power up and down as your business needs in a few minutes. The second, is the ability to …

passwords

TECHTIP#2 : How to find good passwords?

Passwords are essential. Indeed, it’s important to protect your network, all its data and your business and/or family. It should meet complex rules to avoid cyberattacks.  DOs and DON’Ts to keep your data and accounts safe: DO NOT use a set of same characters/numbers or adjacent on your keyboard: hhhh, 4444, qwerty, 5678. DON’T get inspired by the top 10 passwords of all time (according to Symantec) are: 1. 123456 2. …

network

Why you should care about your network?

Network run offstage in everyday life, in our business or personal life, and we don’t think about that until something wrong happens. But, what a worst thing than wait in front of a slow screen? So, imagine if your clients wait because of your malfunctioning system… Today, everything works with technology and it grows every time. In addition, it includes more and more business applications in cloud computing: Microsoft Office365 …

cyberattacks

TECHTIP#1: Stay safe from cyberattacks

8 behaviors to avoid to stay safe from cyberattacks: Clicking a phishy email Clicking a “cute cats” link on social media that introduce malware Not updating your software and never get the latest security patches Uploading list of social security numbers to Dropbox Using an unmanaged personal device to access company cloud applications Keeping important data on your computer and not on server (servers are usually backed up daily and …