Publications

COVID-19: How hackers profit from the pandemic

As we fight the spread of Coronavirus, the number of cyber attacks has been on the rise in recent weeks. And for good reason, cybercriminals are taking advantage of the fear associated with COVID-19 to disseminate false information and encourage users to click on...

read more

Why should you be concerned about Emotet ?

Not sure what Emotet is? Fair enough, you’ve already got enough on your plate. That said, it’s important to know that Emotet is a cybersecurity threat that could jeopardize the resilience of your company. What’s Emotet ?  Emotet is a Trojan horse that hides in your...

read more

Making the most of your tools to manage vulnerabilities

Publications   As you know, vulnerability management is an essential part of an organization’s cybersecurity plan. Although companies recognize the importance of this step, many face a major obstacle: The tools they use to scan their millions of assets have...

read more

Sharing sensitive data securely

Do you ever stop and think about the amount of data circulating around your office? How can you protect your company and manage the vulnerabilities related to this information? Even if you’ve detected the gaps in your own cybersecurity, what about your business partners?

read more

A look at the world of computer forensics

When a client’s IT systems are impacted by a security incident, cyber investigators (or digital forensics investigators) track down the hackers responsible. This profession is still fairly new, but sure to grow as more and more of our day-to-day activities take place in cyberspace.

read more

Building a cybersecurity plan for your company

Today’s pirates have traded gold for data, and rather than sailing the seven seas, they surf the web looking for vulnerabilities. Companies are exposed on several fronts, with no choice but to invest in protection against insidious attacks by cybercriminals. In order to invest wisely, the first step is to detect gaps and assess the cybersecurity risks that threaten your network.

read more

SECURITY ADVISORY : Heightened threat from a very damaging infection

As a specialist in investigating and responding to cybersecurity incidents, Forensik is concerned about a marked increase, over the last 3 months, in a threat that has already affected a number of our clients, seriously impacting the availability of their systems and their ability to conduct their business.

read more

Security bulletin regarding e-mail accounts using cloud computing

Experts with Forensik are concerned about a rise in cybercriminal activities targeting business webmail accounts such as Office 365 and Gmail (but not restricted to these). Our teams have noticed that very well-organized, patient hackers are succeeding in diverting electronic payments, in some cases amounting to hundreds of thousands of dollars or more.

read more