About Sandra Viveiros

This author has not yet filled in any details.
So far Sandra Viveiros has created 128 blog entries.

What is the Dark Web? – Screenshots from the Dark Web

By |2021-04-20T08:05:30-04:00April 20th, 2021|Cyber Security Awareness, Dark Web Monitoring, National Cyber Security Awareness Month, Website Security|

With all of our seemingly trustworthy big businesses constantly getting attacked by cyber criminals, you may have wished upon a star for a place on the internet where you are untraceable – a place you can explore with complete anonymity. That virtual haven is known to its users as the Dark Web.

Although complete anonymity is nearly impossible, surfing the Dark Web is the closest you can get to it. But what is it? To understand the Dark Web, you must have a good understanding of how the internet works.

When we’re looking at the internet, a great analogy to use is the famous iceberg:

How the Internet works Iceberg

Looking at this iceberg – what the common user thinks the whole internet consists of is actually only the Surface Web. This is the portion of the World Wide Web that is readily available to the general public.

What it consists of is anything you can access for free, which is also why its called the Open Web. Most of the websites you can access on search engines like Google and Bing, these are all considered to be part of the Surface Web.

We are all familiar with this part of the internet since we use it to run businesses and connect with family, friends, and customers, and much more. But what’s crazy is that The Surface Web only consists of about 4% of the information that is on the internet.

Now as we start to move below the surface on our iceberg, an estimated 96 percent of the internet lives here in what is called the Deep Web. No one really knows how big the Deep Web really is, but it’s hundreds (or perhaps even thousands) of times bigger than the Surface Web.

What this part of the internet consists of is data that you won’t be able locate with a simple Google search and is not open to anyone to access. Most sites that require credentials to get into can be categorized as the Deep Web.

In reality, most of us use the Deep Web everyday without even realizing it with things like email, online banking, and pretty much everything that requires a username and password to access.

There’s a flip side of the Deep Web that’s a lot murkier, and sometimes darker. This is why it’s known as the Dark Web. That is represented by the bottom portion of the iceberg.

In the Dark Web, the users really do intentionally bury data. Often, these parts of the Web are accessible only if you use special browser software. You won’t be able to get the dark web websites with Google Chrome, Mozilla Firefox or Internet Explorer. The most common dark web browser is called the Tor Browser, and what the Tor browser does is it makes the user anonymous, so it becomes extremely safe for criminals.

Tor Browser Logo

However, the dark web isn’t all bad; it’s used for an array of purposes of everyday people. For example, journalists use the dark web to help protect their sources, there are social media websites, and the government may also use it in whistle blower situations.

But unfortunately, the dark web carries a notorious reputation as the haven of criminals, terrorists, nefarious sites, and everything in-between. It is a huge marketplace for stolen data and personal information. After a data breach or hacking incident, personal information is often bought and sold on the dark web by identity thieves looking to make money off your good name.

The Dark Web attracts all types of crime, simply because of the anonymity of it. In fact, it’s estimated that 50% of all Dark Web sites are used for criminal activity. This criminal activity can include the selling of narcotics, illegal weapons and firearms, hired assassins, child pornography, malware, and anything else cyber criminals can do over a wired connection.

How does this cyber criminal underworld affect you?

When data breaches occur to big corporations, the credentials, SIN, banking info, etc. – it all starts to get sold all over the Dark Web. That stolen data is then used to steal your identity, your money, and further spread the computer diseases to your friends and colleagues.

Just to show you how legitimate the sites are on the dark web, we’ve taken some screenshots to share with you!
Clone Card Crew Dark Web Website

This dark web website is called the Clone Card Crew, and it’s a criminal website where you can buy and sell real credit cards. The selling of Credit or Debit card information is very popular on the dark web, with this site selling information from $5-$110.

What they’re selling is a “full” package purchase for the fraudsters: including the stolen name, SIN, birth date, account numbers… really anything you need to use the card effectively. Sites like this will even discreetly mail you the card, so your neighbors have no idea what you are up too! And to ensure the validity and trustworthiness in the purchase, buyers can even leave reviews for sites like these, similarly to how someone would leave your company a google review!

300 Fullz on the Dark Web

This is an example of a post on the dark web were a cyber criminal is selling 300 “Fullz” of Californian business owners. The word fullz is a slang term used by credit card hackers and data resellers meaning full packages of individuals’ identifying information. Fullz usually contain an individual’s name, SSN or SIN, birth date, account numbers and most other data. With this post in particular, the price was extremely low; for only 15 euros, you can steal the identity of 300 people and possibly ruin their lives. As we can see, it was so popular that it sold out.

How can you stay protected from the Dark Web?

Here’s a step by step process to ensure greater security:

1 – Knowledge is Power:
With our Dark Web Monitoring, you can receive up to the minute alerts as to when your business credentials are being sold on the dark web. This is one of the best ways to stop cyber attacks towards your business before they happen.

Register for a free domain check to see if you or your organizations credentials are being sold over the Dark Web.

2 – Password Protection is key:
About 80% of people will use the same password or a derivation of the same password for multiple different services [2]. This makes it extremely easy for hackers to gain access to multiple services if they buy only one on the Dark Web. “P@ssw0rd1!” is not hard to crack – check out our password tips to become more secure.

3 – Use multi-layered security solutions for your services:
This is great protection in the event that a cyber criminal gets access to your credentials and is actively trying to log into your accounts. Wherever possible, enable 2-Factor Authentication or Multi-Factor Authentication.

For example; you can set most of the popular social media websites to send you a verification text message every time your account is signed into, to ensure that it’s actually you signing in. This extra layer could be the difference between safety and a huge cyber attack.

4 – Keep your software up to date: In 2017, the infamous Wannacry ransomware ran rampant throughout the world whereas over 150 countries and over 200,000 organizations were impacted. This was simply because the hackers found an exploit in older Windows operating systems. Security updates can seem mundane, but they’re there for an ever-important reason.

Antivirus services are constantly finding new threats and updating their procedures. Make sure to update your software so you are protected from the newest and more sophisticated threats.

5 – If you’re breached, call in the experts:
When you deal with cyber crime, it’s especially hard to fight back without the help of an expert. Not everyone or every organization can spend all day thinking about security, but there are experts like E-Tech who do.

Feel free to Contact Us for more information.

E-Tech Wins ASI’s Authorized iMIS Consultant of the Year for 2020

By |2021-04-08T12:19:50-04:00April 8th, 2021|About Us, Awards, iMIS|

Toronto, ON, April 8th 2021— E-Tech today announced that Advanced Solutions International (ASI), a leading global provider of software and services for associations and non-profits, awarded them with the Authorized iMIS Consultant of 2020 for Canada.

“I am very excited and honoured to receive such a prestigious award,” said Ian Evans, President & CEO at E-Tech. “We have been an AiC since 2005, and this is the first time we’re winning this award. With 2020 being such a tough year for everyone due to COVID, being named AiC of the year for Canada is extra special. I have an amazing, hardworking team and I would like to thank each and everyone of them. They all deserve a piece of this award. Thank you very much!”

“This AiC is the third largest iMIS consultant in Canada, and provides hosting services to over 20% of our Canadian clients”, said David Riffle, Global Vice President of Channel Management at ASI. “Also, in 2021, they were ranked the #1 Managed Service Provider in Canada, and #14 in the world by Channel Futures. E-Tech is AiC of the year, Canada.”

About E-Tech

E-Tech has been providing system support and information technology consulting services to our clients since 2005. We attribute our strength and success to our close working relationship with each and every one of our clients – regardless of size. We design our services specifically to help our clients succeed in today’s complex business environment, keeping in mind our client’s goals, objectives, and bottom lines. Since our inception, we have been establishing a strong bond with small to medium businesses and not-for-profits by delivering cyber security protection, website hosting services, IT support solutions, and website design services.

About ASI

Advanced Solutions International (ASI) is a leading global provider of products, programs, and services that help associations and non-profits improve operational and financial performance. Since 1991 they’ve helped thousands of clients grow revenue and reduce expenses by providing industry expertise, best practice advice, and proven solutions.

ASI is the developer of iMIS EMS, the world’s #1 association and non-profit software solution, and the only Engagement Management System (EMS)™ – fusing database management and web publishing into a single system – leading to operational efficiencies, revenue growth, and continuous performance improvement. Harnessing the power of Microsoft Azure’s cloud platform, iMIS EMS is purpose-built to meet the most important challenge facing associations and non-profits – Engagement. We have a global network of nearly 100 partners to provide you with a full range of services to implement and support your iMIS EMS platform. Learn more at www.advsol.com.

Best Password Security Tips – How Hackers Steal Your Passwords

By |2021-03-18T12:35:36-04:00March 18th, 2021|Cyber Security Awareness, Dark Web Monitoring, IT Support, Uncategorized|

Unless you live under a rock, most people have at least one password in use. In reality, it’s more like most people have 20+ different accounts online that require a username and password! But we all know how hard it is to have a different and unique password for all of our accounts, and that’s why most people cheat. In fact, about 80% of people use the same password or a variation for more than one account!

So what? What’s the big deal of using the same password? The real problem is cybercrime. To say it’s a problem is an understatement. Cybercrime is the most lucrative criminal activity in the world, passing illegal drugs in 2014. Hackers want your passwords, if they don’t have them already. Whether they’re stealing your passwords to sell on the dark web, to gain access to your system, or to blackmail you into paying a ransom, it’s a huge opportunity to gain money.

How do hackers steal your passwords?

There are so many ways, and I’ve highlighted a few of the most common ways.

  1. Buying them on the dark web.
    You might have heard of the world’s biggest data breaches, including Facebook, Twitter, Microsoft, Capitol One, and more. Anytime there is a major data breach, the information is bought and sold on dark web marketplaces.
  2. Brute Force Attacks
    These are automated guesses of billions of passwords a minute until the correct one is found.
  3. Key Logging
    A program is downloaded onto your computer where a hacker is watching all your keystrokes as you type them.
  4. Manual Guessing
    Personal information, such as name and date of birth can be used to guess common passwords.
  5. Social Engineering
    Attackers use social engineering techniques to trick people into revealing passwords.
  6. Stealing Passwords
    Insecurely stored passwords can be stolen – this includes handwritten passwords hidden close to the devices.
  7. Shoulder Surfing
    Observing someone typing in their passwords.
  8. Searching
    IT infrastructure can be searched for electronically stored password information.
  9. Interception
    Passwords can be intercepted as they are transmitted over a network
 Given all this information, what are the best password security tips?
  1. Have a different UNIQUE password for every account.
    Minimum 8 characters in length, with a combination of letters, numbers and symbols. Some of the worst passwords we still see today: Password123, letmein, testtest, basketball, qwerty.
  2. Keep passwords tough to guess, where even a family member couldn’t figure it out.
    Do not use something from your everyday life like your family member’s name, a favourite sports team, or your gym you visit. Through social engineering, a hacker knows what you do and where you go on a regular basis, and the first passwords they’ll try will be about those details in your life.
  3. Change your passwords every 3-6 months.
    With all the data breaches that occur everyday to the major companies we trust; your passwords are already out there on the dark web being sold. It’s important to change your passwords every 3-6 months because the old ones the hacker already has are no longer in use.
  4. Use a password manager app to help create and secure passwords (KeePass, LastPass).
    This is a safe way to keep all your passwords in one place and encrypted. Some password managers can even create strong passwords for you and automatically load them for you.
  5. Enable two-factor authentication (2FA) for an additional level of security.
    Wherever you can, enable 2FA so when you’re logging into an account, a code is sent to a separate device that you own. It’s important that the code is sent to a SEPARATE device because a hacker could have access to your device, and a security code to the device they have access to is rendered useless. If you’re logging in on your laptop, have the code sent your phone, for example.

Of course, the most educated internet users know that even having the best password security does not prevent you from cyber attacks. Do you need help with fighting cyber crime? Start with checking out our Ultimate Cyber Security Package and our Remote Worker Cyber Security Package!

E-Tech Ranks Among CRN’s MSP 500 List of 2021

By |2021-02-18T11:31:05-05:00February 18th, 2021|About Us|

Toronto, Ontario, February 18th, 2021 – E-Tech announced today that CRN®, a brand of The Channel Company, has named E-Tech to its 2021 Managed Service Provider (MSP) 500 list in the Pioneer 250 category. The list, released annually, recognizes the leading North American solution providers that have demonstrated innovative and forward-thinking approaches to managed services. These services help end users improve operational efficiencies and navigate the ongoing complexities of IT solutions, while maximizing their return on IT investments.

“No one can run a business alone,” said Lloyd Evans, Vice President, Information Technology. “Ian and I – we are nothing without our team. We are so proud of the great work that our team continues to do on a daily basis, even amidst a global pandemic. The CRN MSP 500 is a group of leading MSPs in a truly competitive and essential industry. We continue to make strides every year and will look forward to our progress for years to come.“

“Effective MSPs enable companies to focus on their core objectives while improving the quality and reliability of their cloud computing capabilities,” said Blaine Raddon, CEO of The Channel Company. “The solution providers on CRN’s 2021 MSP 500 list deserve recognition for their innovative and forward-thinking approaches to managed services, and the ability to optimize operational efficiencies and systems to maximize return on investments.”

With cutting-edge approaches to delivering managed services, MSPs have become an integral part of the success of businesses worldwide. They help empower organizations to leverage complex technologies, keeping a strict focus on their core business without straining their budgets. CRN’s 2021 MSP 500 list identifies the market’s key managed services players who are setting themselves apart with best-of-breed solutions that provide the business outcomes customers need.

The MSP 500 list is divided into three sections: the MSP Pioneer 250, recognizing companies with business models weighted toward managed services and largely focused on the SMB market; the MSP Elite 150, recognizing large, data center-focused MSPs with a strong mix of on-premises and off-premises services; and the Managed Security 100, recognizing MSPs focused primarily on off-premises and cloud-based security services.

The MSP 500 list will be featured in the February 2021 issue of CRN and online at www.CRN.com/msp500.

About E-Tech

E-Tech has been providing system support and information technology consulting services to our clients since 2005. We attribute our strength and success to our close working relationship with each and every one of our clients – regardless of size. We design our services specifically to help our clients succeed in today’s complex business environment, keeping in mind our client’s goals, objectives, and bottom lines. Since our inception, we have been establishing a strong bond with small to medium businesses and not-for-profits by delivering cyber security protection, website hosting services, IT support solutions, and website design services.

About The Channel Company

The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequalled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace. www.thechannelcompany.com

New Year, New Home Office Security Strategy!

By |2021-01-20T14:18:04-05:00January 20th, 2021|Business Continuity Solutions, Cyber Security Awareness, Uncategorized|

Make security your New Year’s resolution!

Home may feel like the safest place on the planet these days, but your personal network might not be. This year, step up your home office security strategy and dedicate 2021 to protecting yourself and your organization online. Get a head start on securing your home office with these 5 tips.

Can’t view the PDF? Download it here.

Title

Go to Top