Idealogical Systems Inc.
Search

Blog

May 2020: Cyber-attack At York University

May 21, 2020 | Cyber Security, Tips & Tricks, Logical Talk

This time cybercrime hit close to home. May 2, 2020, York University was hit by a ‘major cyber incident’ that affected their Office 365, website, on-campus access to the internet, VPN for remote access, CRM for student email communication, internal drives and more.

Don’t Let The Pandemic Make You A Victim Of A Cyber Attack

April 30, 2020 | Cyber Security, Helpful Advice, Tips & Tricks, Logical Talk

Did you know that according to U.S. Securities and Exchange Commission – Sixty per cent of small companies that suffer a cyber-attack are out of business within six months? As the coronavirus continues to make us work from home, the cybercriminals are getting laser-focused at finding their next target. These hackers are mainly focused on attacking small and medium-sized businesses because the hackers know that SMBs are focused on surviving in this challenging time

If You Think Your Business Is Too Small To Be Hacked During The Pandemic… You’re A Cybercriminal’s #1 Target

April 23, 2020 | Knowledge Base, Logical Talk, Cyber Security

Many cybercriminals look at small businesses like blank checks. And, during the ongoing pandemic, thinking of cyber security is not on the priority list for business owners and HACKERS AND CRIMINALS KNOW THIS and they love those odds.And the attacks have increased exponentially. Don’t believe us? Read the frequent warnings from the officials.

‘Zoom-Bombing’: Using ZOOM for virtual meetings while you Work From Home? You could be at risk

April 09, 2020 | Tips & Tricks, Logical Talk, Helpful Advice, Cyber Security

Everything you need to know about Zoombombing and how you can protect yourself from this new cyber attack.

Everything You Need To Know About Denial of Service (DoS) Attack

February 27, 2020 | Logical Talk, Helpful Advice, Cyber Security

Denial of Service (DoS) hacking is where a thief/hacker will restrict access to devices, network and other systems machine or network resource unavailable to its intended users by disrupting services of a host connected to the Internet.