Category Archives: Security

Securing Business Assets: Unveiling the Key Elements of Network Protection

Woman unlocking her smartphone with a passcode

Technology is constantly changing, and so is technological infrastructure. IT organizations and businesses worldwide spend billions on hardware and software that are essential to how a business functions, but this side of business depends on network protection.  But just how does cybersecurity work? What do you need to know as a business owner to equip […]

Securing Legal Data: Why IT Infrastructure Services Matter for Lawyer Offices

Lawyers meeting with a client

When it comes to cybersecurity, every business needs to implement its own strategy for network safety. Whether you have ten or a hundred employees, everyone’s workplace should be secured and free from malicious cyber attacks.  There are plenty of instances of cyber attacks on American and Canadian businesses, such as the MOVEit Attacks in August […]

Vulnerabilities in Fax Protocol Let Hackers Infiltrate Networks via Fax Machines

By Catalin Cimpanu August 13, 2018 Two recently discovered vulnerabilities in the fax protocol can transform fax machines into entry points for hackers into corporate networks, two Check Point researchers revealed last week in a talk given at the DEF CON 26 security conference held in Las Vegas. Named “Faxploit,” this attack targets the ITU T.30 […]

[Heads-Up] Warn Your Employees. This Is the Year That Sextortion Spear Phishing Is Skyrocketing..

[Heads-Up] Warn Your Employees. This Is the Year That Sextortion Spear Phishing Is Skyrocketing… Intrepid cyber-investigative reporter Brian Krebs noticed that a story published on his blog July 12 about a new sextortion-based spear phishing scheme—which uses a real password used by each recipient—had become his most-read piece since his site launched in 2009. He […]

Attacks Evolving – Phishing via XPS Files

Uptick in Phishing Attempts via XPS file extensions We’ve seen it time after time, malicious actors routinely attempt to confuse recipients of messages with obscure or lesser-utilized file extensions. Over the past month, some phishing attempts using xps files instead of the typical pdf or doc/docx formats have been captured by our filters.  The xps […]

SEND AND RECEIVE LARGE FILES SECURELY

A NEW PARTNERSHIP WITH LIQUIDFILES Infinity Network Solutions has partnered with LiquidFiles. Our partnership allows us to provide a solution to send and receive large files securely, fast, that has ease of use, manageable, flexible and is brandable. A perfect solution for any professional office that sends large, confidential files. Excellent, competitively priced alternative to […]

Turns out the Equifax hack was even Worse than we Thought

The largest breach of 2017 may have been even more serious than initially thought: The cybercriminals behind the Equifax hack accessed user data not previously disclosed by the company, including tax identification numbers, email addresses, and driver’s license information, The Wall Street Journal reported. The criminals behind the Equifax breach accessed user data not previously disclosed […]

Cisco Report: Bad Privacy, Cybersecurity Procedures Causing Companies To Lose Sales

A new report from Cisco showed that two-thirds of companies are currently losing sales because of their customers’ growing privacy concerns, which prolong the sales process. Similarly, bad cybersecurity practices are costing companies millions to hundreds of millions of dollars in repairing data breach damage, as well as lost revenue. 2018 – The Year Of […]

The device you’re using right now has a big security flaw — but you don’t have to panic

There’s almost certainly a critical security flaw or two in the device you’re using to read this story — but you don’t have to panic. To varying degrees, the flaws affect processors found in virtually all computers and phones, and could allow an attacker to access data stored in a device’s memory that should typically […]

Why Phishing Attacks Persist Despite Increased Awareness

Phishing attacks are not going away. They remained a steady tactic used by cybercriminals throughout the first half of 2017, according to the Phishing Activity Trends Report recently released by the Anti-Phishing Working Group (APWG), an international coalition of industry, government, law enforcement and nongovernmental organizations. In phishing attacks, scammers use fraudulent websites and false […]