24 Hour Support Desk (905) 307-4357



MBC Blog

Insights on Industry, Technology and Trends



Can Ransomware Infect Cloud Storage?

This entry was posted on by Maria Kelebeev.
Can Ransomware Infect Cloud Storage

Ransomware has emerged as one of the most damaging online threats and is increasing rapidly in popularity. The word ransomware comes from the words ransom and software combined, and it is a dangerous form of malware that can rapidly encrypt…

Can Ransomware Encrypt Encrypted Files?

This entry was posted on by Maria Kelebeev.
Can Ransomware Encrypt Encrypted Files

No organization wants to become a victim of cyber criminals. With ransomware attacks and data breaches on the rise, proper security is essential and one of the recommended steps is data encryption. But can ransomware encrypt encrypted files? Unfortunately, it…

What Do Cyber Security Experts Do?

This entry was posted on by Maria Kelebeev.
What Do Cyber Security Experts Do

With all the talk regarding cyber attacks and the importance of keeping your business secure, you may have wondered what exactly do cyber security experts do? There are many different titles for individuals in this profession, including cyber security consultants,…

What Are Cyber Security Attacks?

This entry was posted on by Maria Kelebeev.
What Are Cyber Security Attacks

A cyber attack is when one or more computers launch an attack against another computer, a group of computers or an entire network. There are two broad types of cyber attack categories, the first being when the main objective is…

How Cyber Security Is Different from Computer Security?

This entry was posted on by Maria Kelebeev.
How Cyber Security is Different from Computer Security

While the internet has transformed the way that businesses operate, while mostly positive, it has opened a whole new word of security threats. Being knowledgeable about the latest cyber security best practices is the first step in protecting your business…

How Can Cyber Security Be Improved?

This entry was posted on by Maria Kelebeev.
How Can Cyber Security Be Improved

Cyber security is a hot topic these days and for good reason. With technology woven into almost every aspect of business operations and cyber-attacks on the rise as they increase in sophistication, regardless of industry, all organizations must remain vigilant….

Can Macs Get Ransomware?

This entry was posted on by Maria Kelebeev.
Can Macs Get Ransomware

For years, Mac users were confident that they didn’t have to worry about getting viruses. In recent history, malware creators often stuck to the most predominately used operating systems in attempt to do as much damage as possible, but today…

Can Firewalls Prevent Ransomware?

This entry was posted on by Maria Kelebeev.
Can Firewalls Prevent Ransomware

When it comes to discussions regarding cyber security, you probably have heard about ‘firewalls’ and how they can be used to help protect your business from cyber-attacks. But can firewalls prevent ransomware threats well? Below, we will explain exactly what…

Who Can Do a Cyber Security Audit?

This entry was posted on by Maria Kelebeev.
Who Can Do a Cyber Security Audit

Having a cyber security plan for your business is essential in order to survive the increasing threat of looming digital attacks. Organizations need to be concerned about keeping their clients’ personal data safe, shield themselves from ransomware and ensure that…

Are Ransomware Attacks Data Breaches?

This entry was posted on by Maria Kelebeev.
Are Ransomware Attacks Data Breaches?

Ransomware attacks are when malware gets installed on a computer, typically via an email attack and can quickly infect an entire business network. Attackers demand a ‘ransom’ fine to be paid in order for the user or business to regain…

What Are Cyber Security Fundamentals?

This entry was posted on by Maria Kelebeev.
What Are Cyber Security Fundamentals?

Cyber security is the practice of protecting networks, systems, programs and devices from cyber attacks. These digital attacks are designed to typically do one or more of the following – extort money from users, destroy critical information, change or modify…

How Does Ransomware Work and Spread?

This entry was posted on by Maria Kelebeev.
How Does Ransomware Work and Spread?

One of the greatest threats that businesses face today is cyber extortion, otherwise known as Ransomware. Having grown into a billion dollar industry, in 2017, Ransomware was responsible for infecting over 4,000 businesses worldwide – every single day. Because Ransomware…

Sextortion Phishing Campaigns and How to avoid them

This entry was posted on by Yasmin Lasry.
Sextortion

Since late 2018, hackers have found yet another way to breach security at your expense. The latest that they’ve come up with is sextortion- or simply blackmail you into paying them money using your fears about your internet activities against…

Security Trends in 2019

This entry was posted on by Yasmin Lasry.

Cybersecurity issues have been making the news for a few years and we can expect significant breaches to occur even more often in the future. The further technology is pushed, with long lists of applications, devices and technological dependencies, the…

Vulnerability Assessments and Penetration Testing

This entry was posted on by Maria Kelebeev.
penetration testing

While the terms Vulnerability Assessments and Penetration Testing may be familiar and frequently used in security conversations, there is still some ambiguity about what they mean. Both play a vital role in a well-rounded security plan and vulnerability management, and…

Innovation and Security

This entry was posted on by Maria Kelebeev.

Innovation and security might not seem as if they should be in conflict, but when creative steps forward open up new territories, they often also expose more vulnerabilities. So does this mean that in order to be secure, a growth…

Phishing – What you need to look for

This entry was posted on by Maria Kelebeev.

Phishing is the fraudulent attempt to obtain your sensitive information. This includes info such as usernames and passwords to email accounts and credit card numbers. This is done by disguising as a trustworthy familiar contact and done via email. HOW…

Cyber Security Tips

This entry was posted on by Maria Kelebeev.

Cyber Security Tips: Cyber security is an issue for everyone to be concerned about. With technology woven into everything, it’s more important than ever to be careful about security. Here is a quick list of cyber security tips that are…

100 Worst Passwords

This entry was posted on by Maria Kelebeev.
100 worst password

100 worst passwords as released by Spashdata every year. This is something that has been put out for the past seven years to bring awareness to the situation. While this gets some attention when it is released, we can all use…

What is the Difference between Layered Security and Defense in Depth?

This entry was posted on by Maria Kelebeev.

Difference between Layered Security and Defense in Depth. With security talk being on top of mind and breaches becoming more and more frequent, there are now best practices for safeguarding business data and keeping the business safe from predators. The…

News and Updates

Latest tweets from MBC:

Can ransomware infect cloud storage? Find out here! mbccs.com/can-ransomware… pic.twitter.com/psiTywQfvY

From MBC's Twitter via Hootsuite Inc.

Join our newsletter!