Cyber Crime Stats from BroadbandSearch

cyber crime

10 Things to Know About Cybercrime in 2024

Cybersecurity has become a vital part of online life. At Info-Tech Montreal, an IT security company, we have seen first hand how the landscape of cyber threats continues to evolve, presenting new challenges for individuals and businesses alike. Learn about the scale and scope of these threats and use it to improve your defense. Here are ten alarming cybercrime statistics for 2024 from Broadband Search that highlight the urgency of bolstering online security measures.

1. Cybercrime Damages Predicted to Reach $10.5 Trillion Annually by 2025

A study by Cybersecurity Ventures predicts that cybercrime damages will cost the world $10.5 trillion annually by 2025. This staggering figure underscores the pervasive and escalating nature of cyber threats. It’s a clear indication that both businesses and individuals must prioritize cybersecurity to mitigate potential losses.

2. 15% Increase in Cybercrime Incidents

Cybercrime incidents have climbed by 15% year-over-year, marking a stark escalation from 2022. This increase isn’t just about the numbers; the nature of the threats themselves is changing, with tactics becoming increasingly insidious and outsmarting traditional security protocols.

3. Most Targeted Sectors

Certain sectors are more vulnerable to cyber attacks due to the high value of the data they hold. The most targeted sectors in 2024 include:

  • Government and Administration: Bearing the brunt with 69% of ransomware attacks.
  • Technology: Breach statistics have swelled by 80%.
  • Healthcare: A 167% rise in sophisticated email attacks.
  • Telecommunications: Over 4.5 billion compromised records in 2023.
  • Education: Ransomware attacks surged, hitting 80% of lower and 79% of higher education institutions.

4. Ransomware Attacks on the Rise

Ransomware incidents have skyrocketed by an alarming 40% year-on-year. Attackers are now engaging in “double extortion,” threatening to publish stolen data unless additional demands are met. The average ransom demand has nearly doubled, reaching $1.54 million in 2024.

5. Phishing Attacks Remain Prevalent

Phishing attacks have evolved and now represent an alarming 36% of total cybercrimes. They target a wide range of demographics, including older generations, new internet users, high-level executives, and small business employees. The most common techniques include deceptive phishing, spear phishing, whaling, smishing (SMS phishing), and pharming.

6. Economic Impact of Cybercrimes

The economic shockwaves of cybercrime have been staggering, with global losses estimated to surpass $8 trillion. The United States alone reported losses exceeding $10 billion in 2022. These financial impacts are compounded by diminished productivity, tarnished reputations, and significant recovery costs.

7. Increase in Insider Threats

Insider threats have risen alarmingly, constituting up to 34% of all cyber incidents. These threats exploit trust and access within an organization, making them particularly pernicious. Common types of insider threats include espionage, fraud, terrorism, theft, and negligence.

8. Exploitation of Remote Work

The shift to remote work has extended corporate perimeters into the more vulnerable terrain of home networks. This has led to increased cyberattacks on home networks, with misconfigured firewalls and the use of personal devices presenting significant vulnerabilities. The data points to a critical need for enhanced cybersecurity measures tailored for remote workers.

9. Growing Use of AI in Cyberattacks

Cybercriminals are leveraging artificial intelligence to orchestrate more sophisticated attacks. AI-driven methods include deepfake phishing, AI-powered malware, automated brute-force attacks, social engineering campaigns, and supply chain attacks. This highlights the dual role of AI in both facilitating and combating cyber threats.

10. Increase in Mobile Cyberattacks

Mobile devices have become prime targets for cybercriminals. The increase in mobile cyberattacks underscores the need for robust security measures to protect against vulnerabilities in mobile devices and applications.

Strengthen Your Cybersecurity with Info-Tech Montreal

In light of these alarming statistics, it’s evident that proactive cybersecurity measures are more important than ever. At Info-Tech Montreal, we specialize in managed IT services, including comprehensive cybersecurity solutions tailored to small and medium-sized businesses. Whether you need co-managed support for your existing IT team or a complete managed services package, we have the expertise to protect your organization against evolving cyber threats. Our team of experts is dedicated to making IT simple and accessible, without the jargon.

Contact us now to schedule a consultation and take the first step towards robust cybersecurity.

For more detailed insights and statistics on cybercrime in 2024, visit the original article at BroadbandSearch.

Windows 7 Dies Today: Here’s What You Need to Know

“Microsoft released Windows 7 in October 2009. Now, more than a decade later, it’s being retired. Your Windows 7 PCs will keep working, but Microsoft is no longer issuing security patches as of January 14, 2020.

Windows 7 will keep working normally, just like Windows XP does. If you have a PC running Windows 7 or Windows XP, you can use it on January 15, 2020, just as you could on January 13, 2020. Microsoft won’t stop you from using your PC. You may see some nags informing you that “Your Windows 7 PC is out of support,” but that’s it.

We recommend you avoid using Windows 7. If you do keep using this operating system, it’s now especially important that you have security software (like an antivirus) installed and take steps to secure your PC.”

Click on the link below for more information.

 

Why A Back-Up Disk Alone Isn’t Good Enough to Secure Your Business

If you’re like most business owners, you likely have a back-up disk to restore your server data in the event of an emergency. But did you know a back-up disk isn’t enough to keep you fully protected and minimize downtime? This type of backup is referred to as a ‘data-based’ backup and is simply not good enough anymore. Whether you experience a total loss or repairable damage to your server, having an ‘image-based’ backup device that saves data to the cloud every hour is your best opportunity for getting your team back to work quickly. Here’s why.

Even With A Back-Up Disk, A Total Loss Could Have You Down for 10 Days or more!

If your server is housed in house, you probably have your back-up disk stored in a different location to protect against incidents like theft or water damage. Theoretically, this keeps your data safe in the event of a total loss of the server. However, even if your back-up disk survives the incident that took out your server, it could take as many as 10 business days to get a new server – then we’ve got to re-install everything and THEN restore the data; and without a server, the back-up disk isn’t any help!

We know you can’t be down for that long, but unfortunately that’s how long it takes to:

  1. Receive your new server
  2. Reconfigure the server
  3. Restore/reinstall all the software
  4. Restore the data
  5. Reconnect all of your business’s computers

Even if your server isn’t a total loss, if it isn’t working properly for one reason or another a technician will need to visit your workplace to address those issues before installing the back-up disk. Depending on the problem, this could take a couple days to complete.

Downtime is Expensive

Even if we can fix your server quickly, copying data from the backup disk to your server can take hours. During this time, no one on your team can do anything. That’s time that you are paying your employees while no work is being completed.

According to IBM, the average infrastructure failure costs businesses $100,000 an hour! Talk about a real pull-your-hair-out nightmare

Protect Your Business With An Image-based Backup and Disaster Recovery (BDR) System

At Info-Tech Montreal, we always recommend that our clients move away from a data-based disk backup solution to an image-based BDR solution.

This BDR device creates images of your server – not just the raw data! – and stores it in on the device itself AND in the cloud. If your server goes down for any reason, we can simply ‘startup’ your server with the image we have of it. It is also able to copy images of the server each hour, as opposed to the back-up disk which usually only backs up each evening, sometimes only each week.

This means if, for example, an employee accidentally downloads a virus that affects everything, we can restore everyone’s files up to the most recent hour.

If you have questions about your disaster recovery plan, need to know how much it would cost you to be down, or if you’re simply interested in learning more about our services to help minimize your downtime, contact us today! We’re always happy to chat and find a solution that works best for you.

How to Use One Drive’s “Personal Vault” to Secure Your Files

“Microsoft’s OneDrive cloud storage service now includes a “Personal Vault” for your sensitive files. These files are encrypted and protected with additional two-factor verification, even when they’re synced to your Windows 10 PC.

OneDrive’s Personal Vault became available worldwide on September 30, 2019. It works on Windows 10, Android, iPhone, iPad, and the web.”

Click on the link below to learn more.

 

customized solutions for your business

Why You Need A Virtual I.T. Guy And Remote Monitoring

When it comes to technology, we expect it to do its main job – make our lives easier and make it easier now. So when you’re sitting in the office and something suddenly pops up that puts a wrench in your busiest day of the week (because that’s when it always happens) what do you do? Who do you call? With Info-Tech, one of the most popular services we offer is remote monitoring and management. Our remote monitoring and management services ensure you are never alone. We offer an entire team of I.T. experts for less than the cost of a full time ‘generalist’. Not convinced? Here are a few main benefits to our remote monitoring and management services.

Get More For Less

If your business has grown beyond a handful of employees and you’re considering hiring a full-time tech to keep things running smoothly, you may want to consider our remote monitoring services instead. For less than the cost of a full-time salaried employee, with Info-Tech Montreal you get a full team of experts, including a dedicated support technician, to handle all of your I.T. needs. The best part? Because we work remotely, you never have to see us!

Solutions Without Disrupting Your Day

Not only can we keep your systems running smoothly, we do our work behind the scenes to minimize the disruption on your day-to-day work. When needed, your support-tech simply connects to your server or PC using remote access software. This allows us to trouble-shoot whatever issues your systems may be having, while you continue to go about your day – you and your employees won’t even know we’re there! Of course, we always check beforehand to make sure we can connect and not disturb some work in progress!

We know that time is money when it comes to running a business, so if there is ever any downtime, we understand the negative impact that can have on your company and your bottom line. Our team of I.T. professionals work quickly and efficiently to get you back up to speed as soon as possible, with pro-active monitoring and ease of remote connections; minimizing that downtime is our priority!

Stay Focused On Your Business

Let’s face it – as a business owner, you have a million things on your plate. Worrying about why your computers and servers aren’t working properly shouldn’t be one of them, so let us take that off your hands. We design and set-up remote monitoring to detect and quickly repair problems, so we can be repairing any issues that might arise before you are even aware of them. In the meantime, your day continues without any of the speed bumps traditionally caused by those system failures. Plus, not only are we watching your system’s back-end, but we’re always keeping an eye on changes occurring in the industry, so you don’t have to worry about your environment staying up-to-date. Let us be the experts for your I.T. services, so you can continue being the expert for your clients.

When your staff are able to work without disruption and any issues that do arise are taken care of quickly, quietly, and remotely, you get peace of mind.

Curious about what may be going on with your company’s I.T.? Do not hesitate to contact us today! Let us help you relieve that unnecessary stress with our remote monitoring services.

How to Tighten all your iPhone’s Privacy Settings

It is always a good idea to review your privacy settings on any device. Most often with apps, when you download them, they always need access to something before being able to work. You would almost always grant the access to use the app properly, but there are ways to control your data and how it is shared. Here is a detailed article on how to review and change your privacy settings specific to iPhone. Click on the link below.

Desjardins Files Leaked

Windows Server 2008 – End of Life

Good Morning,

Please note that Windows Server 2008 is nearing its End Of Service Life! Customers still running Windows Server 2008 after end of support will face a number of challenges: increased threat of cybercrime, loss of support for popular applications, rising costs and limited options for Cloud computing.

What does End of Life mean?

Almost all Microsoft products have a support lifecycle during which Microsoft provides new features, bug fixes, security fixes, and so on. The end of this lifecycle is known as the product’s End of Life. When Windows Server 20018 reaches its End of Life before the end of this year, Microsoft will no longer provide:

1. Technical support for issues
2. Bug fixes for issues that are discovered
3. Security fixes for vulnerabilities that are discovered

Advisory: Windows Server 2008 will reach End of Service Life (EoSL) officially ends on January 14th 2020. However we recommend transition to Windows Server 2016 or Windows Server 2019 to ensure ongoing support and avoid disruption to your business prior to thisdate. 

We strongly encourage that you upgrade as soon as possibleto avoid any down time. Please contact us to assist with your transition.  Our support team will be glad to help out!

Bad Rabbit – New Ransomware Virus

Organizations in Russia, Ukraine and a few hours later also the U.S. are under siege from Bad Rabbit, a new strain of ransomware with similarities to NotPetya.
The outbreak started Tuesday and froze computer systems in several European countries, and began spreading to the U.S., the latest in a series of attacks.
Department of Homeland Security’s Computer Emergency Readiness Team issued an alert saying it had received “multiple reports” of infections.

Russia’s Interfax news agency reported on Twitter that the outbreak shut down some of its servers, forcing Interfax to rely on its Facebook account to deliver news.

Bad Rabbit Starts With Social Engineering

The outbreak appears to have started via files on hacked Russian media websites, using the popular social engineering trick of pretending to be an Adobe Flash installer. The ransomware demands a payment of 0.05 bitcoin, or about $275, from its victim, though it isn’t clear whether paying the ransom unlocks a computer’s files. You have just 40 hours to pay.

Bad Rabbit shares some of the same code as the Petya virus that caused major disruptions to global corporations in June this year, said Liam O’Murchu, a researcher with the antivirus vendor Symantec Corp.
Based on analysis by ESET, Emsisoft, and Fox-IT, Bad Rabbit uses Mimikatz to extract credentials from the local computer’s memory, and along with a list of hard-coded credentials, it tries to access servers and workstations on the same network via SMB and WebDAV.

The hardcoded creds are hidden inside the code and include predictable usernames such asrootguest and administrator, and passwords straight out of a worst passwords list. (Note To Self: all user passwords need to be strong, step all employees through a strong password training module ASAP.)

As for Bad Rabbit, the ransomware is a so-called disk coder, similar to Petya and NotPetya. Bad Rabbit first encrypts files on the user’s computer and then replaces the MBR (Master Boot Record).

Ouch, that basically bricks the workstation. 

Courtesy of KnowB4

Contact us today to review your passwords and to ensure your systems are secure.

Equifax Hack

Equifax, the credit reporting giant, announced Thursday that they were hacked sometime between mid-May and July of this year. The breach exposed the information of an ‘unknown’ number of people living in Canada and the UK. They have yet to reveal how many Canadians had their personal information hacked over the Spring and Summer.
Hackers were able to get names, SIN’s, birth dates, addresses, credit card information and some driver license numbers. That is enough information to fill out a mortgage application or get a credit card for example.
Equifax said it will send direct mail notices to consumers that were impacted. They have also established a website where people can check if their personal information was stolen.
If you find your information has been compromised, there are a few things you can do to protect yourself from identity theft;

  • Monitor your Equifax score
  • Watch your credit inquiry (anytime a potential lender checks your credit i.e. credit card company)
  • Freeze your credit reports (this restricts access to your credit report)
  • If your SIN was stolen, file a police report
  • Check your credit card statements
  • Alerts banks and strengthen your passwords

Although they haven’t released the number of Canadians affected, they did state that nearly 143 million people were affected in the US.

Here is a fresh-from-the-press Current Events template to safeguard against inevitable Equifax-themed phishing campaigns by the bad guys: (courtesy of KnowBe4)

Call Now Button