Follow Us:

Call Us: (289) 316-0507

 

Blog

https://www.mixcloud.com/darnitgroup/darn-it-podcast-episode-3-increase-the-efficiency-of-your-risk-and-compliance In this next episode of Darn IT Podcast, Darnley speaks about enhancing your risk and compliance profile in the digital age. Understanding by adopting the right tools, your business can become more cyber resilient. ...

Read More
Darn IT Group - Voice Assistants

Apple, Amazon, and Google recently changed their policies after privacy concerns were raised Voice assistants have revolutionized the industry when it comes to having an extra set of digital hands in our home or office. Privacy was always the forefront of this and many sci-fi spinoffs were made to make us even more paranoid of our soon to be robot overlords. Because your privacy matters There have...

Read More

In this podcast, you will hear some of the reasons why you and your business must be cyber aware in today's world. Even if you are running a small business, Darnley talks about the importance of having the right mindset while proactively keeping your pencil sharp to mitigate these risks. https://www.mixcloud.com/darnitgroup/darn-it-podcast-episode-1-are-you-cyber-aware ...

Read More
Capital One Breach

Stolen data includes names, addresses, phone numbers, and credit scores. CapitalOne infrastructure breach Capital One disclosed on Monday that personal information - including names, addresses, phone numbers, and credit scores - 100 million individuals in the USA and six million people in Canada were obtained by the Seattle hacker. Approximately one million social insurance numbers of Canadian credit card customers were also stolen. According to court documents, a...

Read More

What is Cryptojacking? Cryptojacking is the secret use of your computing device to mine cryptocurrency. How it is utilized? Cryptojacking or cryptocurrency mining works by websites running hidden mining scripts in your browser without your knowledge/consent. They mine by using your computer's processor to earn money for someone else. Your machine may get hot, loud, and slow. How Do I Protect My Business? I always suggest keeping your browser up...

Read More

What is trust? As human beings, we have the tendency to trust others, even if we like to think so or not. In the new digital age of social engineering, the attacks are going beyond your typical obvious looking phishing attacks with fake company logos, fake help desk phone calls – however, more sophisticated attacks are emerging that go beyond amateur means.

According to Microsoft Secure Blog The Emerging Era of Cyber Defense and Cybercrime, by the year 2020 the world will need to cyber defend 50 times more data than it does at the present day. The World Economic Form recognized cyber risk as one of the top commercial risks facing the world today.