24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



What is URL Phishing?

This entry was posted on by Pavel Odnoletkov.
What is URL Phishing?

As cyber threats continue to grow and cause more problems to organizations across the globe, a pressing question on the minds of many IT professionals is ‘What is URL phishing?’ Cyber threats can be designed to steal intellectual property or…

How Does Ransomware Spread?

This entry was posted on by Pavel Odnoletkov.
How Does Ransomware Spread

There’s been a lot of news about ransomware these days. Affected governments, administrations, and businesses have been extorted for millions of dollars to regain access to their data and systems – with varying levels of results. It can also happen…

What are Some Good Cyber Security Habits?

This entry was posted on by Pavel Odnoletkov.
What are Some Good Cyber Security Habits?

Ensuring your computer is secure is an important part of keeping it in good working condition. It will also make sure your information is safe and only shared with those to whom you’ve given permission. Cybersecurity actually comes down to…

What is Malware vs Virus?

This entry was posted on by Pavel Odnoletkov.
What is Malware vs Virus?

Most computer users have very likely come across the terms “malware” and “virus.” In fact, many computer users may have had firsthand experience with one or both of these ill-natured computer programs. And while the two terms are often used…

What is a Vulnerability Assessment?

This entry was posted on by Pavel Odnoletkov.
What is a Vulnerability Assessment?

A vulnerability assessment is a detailed evaluation of your organization’s networks and systems for potential weaknesses and threats. The process involves an analysis that locates and then accesses the consequence of each weakness to prioritize correcting any flaws in your…

Who is Responsible for Cyber Attacks?

This entry was posted on by Tammy Nyman.
Who is Responsible for Cyber Attacks?

According to research, the general public often holds the CEO of a company personally responsible for an organization’s cybersecurity. When organizations fall victim to cyber-attacks or data breaches, many people believe that C-level executives should be personally held accountable Plus,…

Will Cybersecurity Dominate Security Concerns in Coming Years?

This entry was posted on by Tammy Nyman.
Will Cybersecurity Dominate Security Concerns in Coming Years?

The massive and hasty transition to a huge global-scale remote workforce earlier this year has put an even bigger buzz on the topic of cybersecurity. While some governments and regulatory bodies such as the GDPR and EU’s Cybersecurity Act have…

Top 6 Signs Someone’s Spying on Your Computer

This entry was posted on by Tammy Nyman.
Top 6 Signs Someone’s Spying on Your Computer

While working away on your computer, you may not realize that you are not alone. Hackers are always attempting to infiltrate new devices and searching for vulnerable spots where they can lurk on your computer and steal sensitive data. Sometimes…

Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

This entry was posted on by Tammy Nyman.
Cyber-Criminals are Deploying Advanced Malware for Ransomware and Data Espionage Attacks

Experts have warned that hackers are targeting Linux, Windows, and macOS operating systems with a sophisticated malware framework, called MATA. Researchers believe this framework has been used since 2018 by a well-known threat actor from North Korea, named Lazarus. A…

IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

This entry was posted on by Tammy Nyman.
IBM Finds Cyberattacks Costing Companies Nearly $4 Million Per Breach

A new report released from the Ponemon Institute and IBM Security advised that data breaches are now costing organizations almost $4 million. The report, titled ‘The Annual Cost of a Data Breach’ presented an in-depth look at what the financial…

How to Protect Your Data with Office 365 Backups

This entry was posted on by Tammy Nyman.
How to Protect Your Data with Office 365 Backups

While Microsoft Office 365 is famed for its suite of collaborative and dynamic workspaces for consumers and businesses, Microsoft’s backup policies can’t guarantee a fast and complete restoration of lost data. The restore process can be complicated, lengthy, and depend…

Cybersecurity After Coronavirus

This entry was posted on by Tammy Nyman.
Cybersecurity After Coronavirus

Liviu Arsene, the security analyst for Bitdefender, recently shared some thoughts regarding the world of cybersecurity after coronavirus settles and what the long-term impact will be. In a recent interview, he stated “Right now IT and security teams should probably…

Cybersecurity Risks Rise with Remote Workers

This entry was posted on by Tammy Nyman.
Cybersecurity Risks Rise with Remote Workers

Recent months have significantly changed the typical corporate environment, as millions of employees transitioned to remote home office work as a result of the COVID-19 crisis. As the transition was in haste in reaction to trying to curb the spread…

Why Multi-Factor Authentication is Essential for Password Security

This entry was posted on by Tammy Nyman.
Why Multi-Factor Authentication is Essential for Password Security

Passwords alone can no longer keep cybercriminals at bay. Even by implementing all the latest recommendations and best practices in password management, unless your organization is using multi-factor authentication, you’re leaving yourself exposed against an attack. The Microsoft Tech Community…

Top Security Tips from MBC

This entry was posted on by Tammy Nyman.
Top Security Tips from MBC

When it comes to keeping secure against the rapidly growing world of cyber threats, there is no shortage of areas where you and your organization need to remain vigilant. At MBC, we understand that these sinister threats can not only…

How Cyber Security Can Be Improved?

This entry was posted on by Tammy Nyman.
How Cyber Security Can Be Improved

Small business owners are under the constant threat of cyber-attacks and the fear that they do not have adequate resources to protect themselves. Every day, the number of cyberattacks is growing and increasing the chance that your organization’s data may…

What Are the Most Common Cyber Attacks?

This entry was posted on by Tammy Nyman.
What Are the Most Common Cyber Attacks

A deliberate and malicious attempt by hackers to breach, disrupt, or destroy the information system and network of an individual or organization is called a cyberattack. The number of cyberattacks is increasing globally every day, crippling businesses overnight and wreaking…

What Cyber Security Can Prevent

This entry was posted on by Tammy Nyman.
What Cyber Security Can Prevent

Cyber security has been a buzzing topic for years as the number and severity of attacks have continued to increase. With the recent coronavirus outbreak, there has been a significant increase in threats across the globe. It is important for…

What are the Types of Cyber Security?

This entry was posted on by Tammy Nyman.
What are the Types of Cyber Security?

As the coronavirus outbreak has caused major disruptions to businesses and has caused many employees to now be working from home, business owners are increasingly concerned about cyber security and if they are properly protected. What are the types of…

How Covid-19 is Causing Cyber Security Concerns

This entry was posted on by Tammy Nyman.
How Covid-19 is Causing Cyber Security Concerns

While the coronavirus (COVID-19) has been dominating the world news lately, what you may not have heard is how it is causing increased cyber security concerns. This is largely due to the massive shift of so many employees having to…

News and Updates

Latest tweets from MBC:

MBC Security Tip: Watch Out for .exe FilesMalware is frequently contained in the files with the .exe extension and once opened will immediately start running the code. Only open .exe files from trusted sources.#cybersecurity #security #infosec #mbcsecuritytips #itsecurity pic.twitter.com/mxlPPFAn9e

From MBC's Twitter via Twitter Web App

Join our newsletter!