24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Sextortion Phishing Campaigns and How to avoid them

This entry was posted on by Yasmin Lasry.
Sextortion

Since late 2018, hackers have found yet another way to breach security at your expense. The latest that they’ve come up with is sextortion- or simply blackmail you into paying them money using your fears about your internet activities against…

Security Trends in 2019

This entry was posted on by Yasmin Lasry.

Cybersecurity issues have been making the news for a few years and we can expect significant breaches to occur even more often in the future. The further technology is pushed, with long lists of applications, devices and technological dependencies, the…

Vulnerability Assessments and Penetration Testing

This entry was posted on by Maria Kelebeev.
penetration testing

While the terms Vulnerability Assessments and Penetration Testing may be familiar and frequently used in security conversations, there is still some ambiguity about what they mean. Both play a vital role in a well-rounded security plan and vulnerability management, and…

Innovation and Security

This entry was posted on by Maria Kelebeev.

Innovation and security might not seem as if they should be in conflict, but when creative steps forward open up new territories, they often also expose more vulnerabilities. So does this mean that in order to be secure, a growth…

Phishing – What you need to look for

This entry was posted on by Maria Kelebeev.

Phishing is the fraudulent attempt to obtain your sensitive information. This includes info such as usernames and passwords to email accounts and credit card numbers. This is done by disguising as a trustworthy familiar contact and done via email. HOW…

Cyber Security Tips

This entry was posted on by Maria Kelebeev.

Cyber Security Tips: Cyber security is an issue for everyone to be concerned about. With technology woven into everything, it’s more important than ever to be careful about security. Here is a quick list of cyber security tips that are…

100 Worst Passwords

This entry was posted on by Maria Kelebeev.
100 worst password

100 worst passwords as released by Spashdata every year. This is something that has been put out for the past seven years to bring awareness to the situation. While this gets some attention when it is released, we can all use…

What is the Difference between Layered Security and Defense in Depth?

This entry was posted on by Maria Kelebeev.

Difference between Layered Security and Defense in Depth. With security talk being on top of mind and breaches becoming more and more frequent, there are now best practices for safeguarding business data and keeping the business safe from predators. The…

The importance of safe passwords

This entry was posted on by Maria Kelebeev.
Safe Password are Key

Although we have all been warned many times and in many ways, passwords are still one of the main causes of security breaches. Is your password P@$$w0rd or your dog’s name? Most of us realize that there are people out…

The Importance of a Cyber Security Plan

This entry was posted on by Maria Kelebeev.
Cyber Security Strategy Plan

The Importance of a Cyber Security Plan. In today’s cyber environment, a cyber security strategy is no longer optional but should have climbed right to the top of every business’s priorities. With a long list of threats waiting on the…

What is Ransomware

This entry was posted on by Author: Yeniffer Padrino.
Ransomware blog - Keyboard al lock

Ransomware is malware that gets installed on a PC user’s workstation using social engineering attacks where the user gets tricked into clicking on a link or opening an attachment. Once the malware in on the machine, it starts to encrypt…

Trick or Threat! Security awareness is your trick.

This entry was posted on by Author: Yeniffer Padrino.
Trick or threat Security Awareness

Security awareness is your best protection as your critical source of risk is your workforce. It’s Halloween time, and real-life cybersecurity horror stories are at the top of many headlines around the globe, they now even target by languages and…

“Why would hackers want to target us??” and other famous last words… (Part I)

This entry was posted on by Mike Opzoomer.
Image of Hacked with numbers

Psst… Hey… I’m not here to scare you. I’m really not the fearmongering type… but I have to be frank with you… bad things are coming. If it hasn’t happened already, then at some point soon, your business is going…

Why Ransomware Attack Threats Target Small and Medium Size Businesses

This entry was posted on by Author: Yeniffer Padrino.
codes targeting a group of small company employees

It’s hard to know why some criminals act the way they act, but in most of the cases, it comes down to a couple of things: Money and (maybe) the need to destroy, some others have the drive to do…

Managed Services and Business Security

This entry was posted on by Mike Opzoomer.
Blog banner with World map of Managed Services and Business Security

Managed Services and Business Security: There’s no denying that Cyber Security is an exponentially-growing threat to today’s business. Owners and IT Teams are scrambling to stay ahead of the steady onslaught of external influences, hackers and malware, perpetually trying to…

About WannaCry, the latest and strongest Ransomware Cyberattack so far

This entry was posted on by Author: Yeniffer Padrino.

By now I am sure you have already heard that one of the biggest ransomware attacks known in history took place on May 14th. The UK’s NHS (National Health Service), FedEx and other important organizations were hit by a cyberattack…

Ransomware Attacks will Double in 2017 Focusing on Financial Institutions and Law Firms

This entry was posted on by Author: Yeniffer Padrino.

Ransomware attacks are expected to be over two times more numerous in 2017 than 2016 having financial institutions and law firms as prime targets. In Europe, some financial institutions had begun stockpiling bitcoins, in case of a ransomware attack. In…

Ransomware – A New Wave for 2017

This entry was posted on by Marketing MBC.
ransomware, security, IT security

ran·som·ware ˈransəmˌwer/ Malicious software accompanied by pop-ups and warning screens that block access to your data and hold files hostage until a sum of money (ransom) is paid to perpetrators. If 2016 was a significant year for data breaches and…

8 Security Resolutions to Strive For in 2017

This entry was posted on by Marketing MBC.

Think Security. At this time of year, it’s common for people to make resolutions about diet, exercise and other areas of their personal lives. This is true when it comes to businesses too, especially in the field of IT security….

5 Aspects Organizations Often Overlook When Implementing a Cyber Security Plan

This entry was posted on by Marketing MBC.

Aspects Organizations Overlook Implementing Cyber Security Plan: In today’s rapidly changing business world, one significant challenge facing many enterprises is an increasing number of data hackers and the corresponding compromise of sensitive data. Financial fraud, identity theft, and unauthorized access…

News and Updates

Latest tweets from MBC:

Why is Secure Guest WiFi for Business So Important? Read all about it in our newest blog post!mbccs.com/why-is-secure-…

From MBC's Twitter via Twitter Web Client

Join our newsletter!