About Sandra Viveiros

This author has not yet filled in any details.
So far Sandra Viveiros has created 128 blog entries.

Facebook Gets Hacked – The 10 Best Ways To Stay Safe on Social Media

By |2018-10-16T16:28:36-04:00October 16th, 2018|Dark Web Monitoring, Uncategorized|

Social media needs no introduction – if you don’t have some sort of social media account by now, you might be living under a rock. Social media covers everything from casual sites (Facebook, Twitter), artistic sites (Instagram, Spotify), and even instructional sites (Waze, Reddit). What fails to be thought of by everyday consumers is how safe is it really?

It seems like every week, another big corporation announces a huge data breach, the most recent and most troubling being Facebook. On September 28th, initial reports by Facebook itself suggested that 50 million users were affected, and most recently (as of Oct. 12th) that number stands at a smaller but still unimaginable 30 million users [1] [2].

How did 30 million people get attacked?

As Facebook explained, hackers were able to exploit a vulnerability in Facebook’s code for the “View As” feature. The “View As” feature allows account owners to see how they’re profile would look like to other people. The hacker exploited this system by making it so if they were logged in as User A and did “View As” User Y, they became User Y. If User Y was logged in, the hackers now had stolen your Access Token, the generated cookie/tool that keeps your account logged in and from having to log in every time you load up Facebook [3].

Who was affected?

Facebook did a scan of all its users who used the “View As” feature in the past year, and deleted their access tokens. That resulted in 90 million users, whether they were hacked or not, experiencing a forced log out. Facebook recently reported that it estimates 30 000 000 affected by this breach.

[2]Out of the 30 million that were affected:

  • 1 million had no Facebook data accessed at all.
  • 15 million had at most their name, phone number and email addresses accessed.
  • 14 million had contact details and other profile data accessed, includingusername, gender, locale/language, relationship status, religion, hometown, self-reported current city, birth date, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, [their] website, people or Pages they follow, and [their] 15 most recent searches.”

Just another of a long list of corporations, social media giants and e-commerce sites to be compromised, it leads us to question if we could ever be safe.

What does it take to have true cyber protection?

With social media, you almost have little control when the biggest of corporations are still vulnerable. With the skill, technology and organization of today’s cyber criminals, it’s not a matter of IF you can get hacked, it’s a matter of being better prepared than someone else. A hacker will not waste its time on a strong defense, especially when there are millions of weak ones.

Here’s the 10 Best Ways to Stay Protected on Social Media:

1. Use a strong password.

  • This is the standard – cyber security 101, but it’s still overlooked by nearly all users. A hacker’s best tool is a brute force attack – an attack designed to discover a password through trying every single combination of letters/numbers/symbols. These attacks 8 BILLION combinations per second. A password should NOT consist of words or phrases. A great way to choose a password and remember it is to pick your favourite line from a movie/book, take the first letter of each word, capitalize every 3rd letter, and then repeat. For example; “O Romeo, Romeo! Wherefore art thou Romeo?” = orRwaTroRrwAtr.A laughing man, saying "I changed all my passwords to 'incorrect.' So whenever I forget, it will tell me 'Your password is incorrect.'"

2. Use a different password for each of your social media accounts.

  • Nearly 80 percent of users use the same, or a variation of one password across several accounts. If a hacker can steal one password, how hard would it be for them to get the 10 other similar ones? You might as well hand it over to them.

3. Never log in from wifi networks you don’t know and be wary of free networks.

  • Anyone can purchase a portable wi-fi adapter from their service provider. There is nothing stopping a criminal from going to your local Starbucks and naming their portable network “Starbucks Free Hi-Speed Wifi.” Next thing is, you logged in to that network – of course you did because it was Hi-Speed – and you’ve now given access to your phone to hackers.A list of Wi-Fi networks with the option "Password is Password" highlighted

4. Be wary of third-party add-ons and apps.

  • That follower tracker you downloaded to track your twitter followers could be developed and designed to trick you into giving up your account information. In fact, in 2017 alone, Google took down 700 000 malicious apps on it’s Play Store that were used for criminal activity.

5. Check your privacy settings.

  • Often overlooked are the privacy settings on your social media accounts. The more private you are, the less likely some can steal your information, it’s as simple as that.

6. Don’t click that suspicious link!

  • I admit that I also want to read “10 Reasons Why Star Wars is the Best Series Ever,” but it could mean clicking a link that’s going to download viruses, malicious software, encrypt your files or even destroy everything all together.

7. Be careful about what you share.

  • Don’t reveal sensitive personal information ie: home address, financial information, phone number. The more you post the easier it is to have your identity stolen. Believe it or not, posts like this exists:A Facebook post of a user exposing their credit card information online

8. If you have social media apps on your phone, be sure to password protect your device.

  • To have a cellphone constantly unlocked is asking someone to steal it. The best protection are the alphanumerical passwords that are available on most smartphones.

9. Remember to log off when you’re done.

The 30 million who got compromised through Facebook could have been safe if they did this simple thing. If it’s an important account, always log out when you’re finished. You can be the most secure, but all a hacker needs is your Access Token, and then they have your account.

10. Keep your firewall security and anti-virus software up-to-date.

When all is said and done, you must have proper anti-virus/anti-malware protection. Watch out for fake software being sold online – those are run by hackers as well. Always buy from a trusted source.

Contact Us to find out if YOUR corporate email address is being sold on the DARK WEB for hackers!

Stay up to date with us and receive Cloud & Security Tips!

>

Summer Is Here! Have You Updated Your Security Procedures?

By |2018-08-13T12:24:40-04:00August 13th, 2018|Infrastructure Security, Uncategorized|

Security is an everyday issue, and the measures you put in place at the beginning of the year are now stale and in need of a tune up. It’s time to bring those procedures into the shop! With so much new technology, and so many new risks, it’s important to continue updating your security measures every so often. Here is a checklist on how to re-invent your security measures this summer:

  1. Educate your staff/re-introduce your procedures

The employee is still the biggest weak link. You can have the greatest security measures on the planet but if your employee clicks the wrong link on their computer, you’ve still become infected. Cyber criminals are becoming smarter by impersonating higher level authorities in companies. For example, a criminal will impersonate your CEO and email finance, asking to wire money. It’s important to educate your staff on what the proper procedures are in your firm, and what security risks they may face day-to-day.

  1. Change your passwords

Every 90 days, you should be changing your password and it’s also important to have secure passwords. A brute force attack – an attack designed to discover a password through trying every single combination of letters/numbers/symbols – can now check 8 BILLION combinations per second. A password should NOT consist of words or phrases. A great way to choose a password and remember it is to pick your favourite line from a movie/book, take the first letter of each word, capitalize every 3rd letter, and then repeat. For example; “O Romeo, Romeo! Wherefore art thou Romeo?” = orRwaTroRrwAtr.

  1. Create a separate Wi-Fi network for IoT devices and guests

A huge new security risk is the emergence of the Internet of Things. Everyday appliances are now being connected to your wi-fi network, without proper security to prevent it from being hacked into. Many will think: “So what? If someone hacks into my fridge, what are they going to do? Turn up the heat?” It’s true that a hacker won’t be able to do much from the initial device, but from that device, it gives access to the whole network and every device connected to it. Through your fridge, a hacker can now access servers, computers, etc. Create a separate network that your non-essential devices can connect to, to separate the risk of a major data breach.

  1. Security scan on Wi-Fi network

It’s important to know what devices are connected to your network and manage the ones that pose a security risk. Many employees and guests connect their personal devices to the office network, so it’s important to do a security scan on your Wi-Fi network to see who is connected, and then disconnect the non-essentials and security risks.

  1. Bring in the experts!

Chances are, you don’t have time to be worrying about security measures all the time, and that’s okay. You need to bring in the security experts, the ones who will think about your security and make sure you’re protected for you. Contact a managed service provider who can help make you feel secure.

Feel free to Contact Us for more information.

Cyber Criminals Reign Over the Final Week of June: Hundreds of Millions of Consumers Data Left for Hackers

By |2018-07-09T12:13:20-04:00July 9th, 2018|Dark Web Monitoring, Uncategorized|

In the last week of June, three companies with enormous databases had their information seized: Adidas, a leading sports gear retailer, TicketMaster, a leading event ticket vendor, and Exactis, a data compiler.

First to get attacked was TicketMaster, who had 40,000 consumers’ data compromised on June 23, 2018. TicketMaster openly wrote about the data breach, claiming it to have affected less than 5% of its global customer base [1]. The breach affected only customers from the United Kingdom but spanned over several months from February to June 23, 2018. If a consumer bought anything on their website within those months, personal and/or payment information may have been accessed by an unknown third party. After reporting the breach, TicketMaster emailed all users they believe were affected, and offered a free 12-month identity monitoring service.

Adidas fell victim on June 26, 2018 by another unidentified third party. An Adidas spokesperson claimed that “a few million” consumers were affected [2]. Limited data was taken, including contact information, usernames and encrypted passwords. Adidas also claimed that there was no reason to believe that any credit card information was taken.

The least known but most surprising was Exactis. The data compiler and aggregator left around 340 million of consumers’ personal data open and accessible to anyone looking for it. Most disturbing is that the data was very specific in nature. Each record had information concerning personal attributes like phone numbers, email addresses, if you are a smoker, what size clothes you wear, etc [3]. The database was first discovered by Vinny Troia, the founder of a New York-based security company. Troia contacted Exactis, as well as the FBI when he discovered the disturbing collection. Exactis has not since given a statement concerning the leak, but the collection is no longer accessible. It’s unclear whether this database was used by cyber criminals, but Troia believes he cannot be the only person to stumble across such a huge collection.

Once more, businesses are reminded that data security is not an option, but an obligation. When a business has proper protection, it is also a deliverable sales pitch for new potential clients. Security can give a business that extra edge over the competition and could be the reason why it continues to grow.

Feel free to Contact Us for more information.

INTRODUCING: Karena Evans, Drake’s exclusive video director for his new record breaking album Scorpion with over 1 billion streams in the first week!

By |2018-07-09T11:46:26-04:00July 9th, 2018|Uncategorized|

Toronto born and raised, Karena Evans is quickly becoming one of the world’s most sought-after directors. The multifaceted award-winning director, actor and writer began her rise as an intern for veteran music video director, Director X. Karena’s style and brand of work led her to direct the ground-breaking GOD’S PLAN, NICE FOR WHAT and I’M UPSET music videos for Drake, along with the ethereal GARDEN video for SZA. This trailblazer is an auteur, a strong black woman and a prolific visionary.

Karena Evans sought out E-Tech to design her professional website, a site projected to be seen by tens of thousands. Karena spoke about the process working with E-Tech:

“Working with E-Tech, especially Lyna and Eric was the most pleasant, stress free but mostly efficient situation I could have asked for. In fact, I’ve recommended their services to a lot of my colleagues in the industry. The turn around time was impeccable, especially in the times needing immediate trouble-shooting, and they made every change I asked for with ease. The collaboration was great too. They made me a custom suit, in the form of a website – what more could I ask for!”

The website can be viewed here: www.karenaevans.com

Web design is an artform. It consists of a lot of planning, creativity and the web designer/developer must know what aspects make a website great. Here are 5 tips we used to make this successful website:

  1. Responsiveness: It’s always important if someone needs access to your website that they can view it in a beautiful and scalable format. Whether it may be on the go, at home or in the office. Your users should be able to view your website on their mobile phones (iPhone, Android, Blackberry etc.), tablets, and desktop/laptop.
  2. Videos: Faster loading speeds have made utilizing video easier than ever. Some sites will use them to complement other content, while others have opted to use videos as backgrounds. This can create a unique and professional website, but it could also come off as distracting. Finding a middle ground is vital.
  3. User Experience: First impressions are everything. Display information that is easy to find with a good flow throughout the website, so users can find their way around the site with ease (User Interface/UI). If the User Experience/UX is negative or positive, this will affect reoccurring visits (loyalty), which will likely contribute to the boost or decrease popularity, exposure, and revenue.
  4. Increase Social Sharing: Whether it may be on Facebook, Twitter, or LinkedIn – if people love how your site looks, feels, or enjoy the content they see, they are more likely to spread the word for you, free marketing!
  5. Faster Load Times: Most mobile users have a need for speed: both in reality & online. Studies show that mobile visitors tend to leave the site if it takes longer than three seconds to load.

Feel free to Contact Us for more information.

Title

Go to Top