Hackers stole your social security number – and 143 million others

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Equifax is the largest consumer credit reporting agency in the United States and collects sensitive information on nearly a billion people worldwide. It’s a publicly traded company with annual revenue of over $3 billion and it has been in business for over a century.

With its experience and responsibility, it would be a sensible assumption that Equifax takes every measure possible to protect the data they hold.

And yet, this isn’t the case. As The Verge reported on September 7:

“Equifax announced today that 143 million US-based users had their personal information compromised this year. Attackers reportedly exploited a vulnerability on Equifax’s website to steal names, Social Security numbers, birthdates, addresses, and, in some cases, driver’s license numbers. Credit card numbers for approximately 209,000 people and certain dispute documents with personal identifying information for approximately 182,000 people were also accessed. Although Equifax operates in other countries, it didn’t detect any stolen personal information abroad.

The company says it discovered the breach on July 29th this year, and has since plugged the security hole. The company also set up a dedicated website — www.equifaxsecurity2017.com — for possible victims to sign up for credit file monitoring and identity theft protection.

Data breaches are fairly common, although those impacting Social Security and driver’s license numbers are rarer and more serious. The fact that Social Security numbers are included in the breach makes it likely that victims will be targeted for identity theft. Equifax says it’s working with both an independent cybersecurity firm and law enforcement to investigate.”

Yes, data breaches are fairly common, but they shouldn’t be. Many breaches start through failures in e mail security or best practices which allow access to corporate systems.

This type of cyberattack can be prevented with the use of Evizone. Through our proprietary software, users have access to the most secure electronic communications and compliance archiving platform commercially available.

Visit us at evizone.com to see how we do it.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Phishing dupes Canadian university out of $11.8 million

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

When private companies fall for the tricks of cybercriminals, it’s their investors who stand to lose the most and who must demand accountability.

Yet when public institutions like schools and hospitals are scammed, taxpayers are left picking up the bill.

The latest example happened at Alberta’s MacEwan University. CBC reports:

“An Edmonton university was defrauded of $11.8 million after staff failed to call one of its vendors to verify whether emails requesting a change in banking information were legitimate.

MacEwan University discovered the fraud on Aug. 23 after the legitimate vendor, a construction company, called to ask why it hadn’t been paid.

Three payments were made to the fraudulent account: one on Aug. 10 for $1.9 million; another on Aug. 17 for $22,000 and a third on Aug. 19 for $9.9 million.

Most of the money — more than $11.4 million — has been traced to accounts in Montreal and Hong Kong, the university said in a news release Thursday.

Those funds have now been frozen, the university said, adding it is working with legal counsel in Montreal, London and Hong Kong to pursue civil action to recover the money. The status of the rest of the missing money isn’t known.

University spokesperson David Beharry said the scammers sent emails that looked legitimate.

“A domain site with the authentic logo was sent,” Beharry told reporters. “The individual asked us to change banking information from the vendor. That information was changed.”

Advanced Education Minister Marlin Schmidt said in a statement he found it unacceptable that the university fell victim to this scam.

He’s asked the chair of MacEwan’s board of directors to report by Sept. 15 about how this could have happened.

“While I’m told that MacEwan has put improved internal financial controls to help prevent it from happening again, I expect post-secondary institutions to do better to protect public dollars against fraud,” Schmidt said in a statement.”

The Education Minister has the right attitude. With everything we know about cybersecurity today, there is no excuse for advanced education facilities to fall victim to such schemes.

There is hope for the University: the perpetrators of the attack were not sophisticated enough to funnel the money elsewhere, and with the funds now frozen, the cash will likely be recovered – at least in part. The next large-scale victim may not be so lucky.

If you’re reading this and concerned about the cybersecurity of your institution – whether it’s public or private, non-profit or for-profit – get in contact with us to learn more about our secure communications software. With Evizone, you never have to worry about anything malicious lurking within your messages.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Post-delivery modification: another nail in email’s coffin

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

The security firm Mimecast has discovered a new email security flaw that is truly terrifying. The threat – named ROPEMAKER – is not thought to have been used by cybercriminals to date. Yet its discovery alone means that any email you receive could harm your computer and files – even if the sender had no malicious intentions. As Mimecast explains:

“Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining the security and non-repudiation of email; even for those that use SMIME or PGP for signing.  Using the ROPEMAKER exploit a malicious actor can change the displayed content in an email at will. For example, a malicious actor could swap a benign URL with a malicious one in an email already delivered to your inbox, turn simple text into a malicious URL, or edit any text in the body of an email whenever they want. All of this can be done without direct access to the inbox.

Described in more detail in a recently published security advisory, Mimecast has been able to add a defense against this exploit for our customers and also provide security recommendations that can be considered by non-customers to safeguard their email from this email exploit.

So what is ROPEMAKER?

The origin of ROPEMAKER lies at the intersection of email and Web technologies, more specifically Cascading Style Sheets (CSS) used with HTML.  While the use of these Web technologies has made email more visually attractive and dynamic relative to its purely text-based predecessor, this has also introduced an exploitable attack vector for email.

Clearly, giving attackers remote control over any aspect of ones’ applications or infrastructure is a bad thing.  As is described in more depth in the ROPEMAKER Security Advisory, this remote-control-ability could enable bad actors to direct unwitting users to malicious Web sites or cause other harmful consequences using a technique that could bypass common security controls and fool even the most security savvy users.  ROPEMAKER could be leveraged in ways that are limited only by the creativity of the threat actors, which experience tells us, is often unlimited.

As time goes on, it becomes clearer that email is not the communication tool of the future. It can be exploited by those who seek to compromise your data in too many clever ways. What is needed to maintain a secure network of communication in the coming years is a tool that provides end-to-end encryption within an environment closed off to third-party actors.

This is exactly what we offer at Evizone. With our Evizone Secure Communications (ESC) product, you can be sure that all communications are sent and received as they are intended.

Contact us to test the strongest commercially available system for the secure exchange of messages, documents and files today.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Could a cyberattack send your stock price crashing?

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

A 2015 Harvard Business Review article argued that data breeches at publicly traded companies don’t generally hurt stock prices. The argument went that the damage from hacks can be hard to quantify or understand, so shareholders only “react to breach news when it has direct impact on business operations” or “results in immediate changes to a company’s expected profitability.” A stock might drop when news of a cyberattack breaks, but the price recovers quickly.

However, things have changed since the article was published.

CIBC World Markets equity strategist Ian de Verteuil made public this week a report titled The Known Unknowns. He suggests “it is likely we will have a major cyber-crime issue at one or more large public Canadian companies over the next year or two” and that it will result in a more important impact on stock prices than we have seen in the past.

The Globe and Mail reports:

“Mr. de Verteuil looked at five major cyberattacks on large companies over the past several years and found that stock prices dropped an average of only 2.4 per cent following a significant breach. In some of the cases there were extenuating circumstances. With JPMorgan, for example, the company made it clear the stolen information did not contain confidential data, such as passwords or account numbers.

In other cases, the attacks were significantly more costly to shareholders than the 2.4-per-cent average price decline. In the month following the 2015 cyberattack on Target Corp., the company’s share price slid, underperforming the market by 400 basis points. When the 2013 and 2014 breaches at Yahoo Inc. were made public in 2016, the company was in acquisition talks with Verizon Communications Inc. “The acquisition price was adjusted lower by $350-million (U.S.) – representing a 7 per cent drop in value,” Mr. de Verteuil noted.

Still, the 2.4-per-cent average decline is significantly less than what Mr. de Verteuil said he would have otherwise expected. That doesn’t mean that investors should be lulled into a false sense of security. According to a 2017 survey by IBM Security and the Ponemon Institute, over the past four years, cybersecurity breaches cost Canadian companies an average of $4.56-million per breach.

“The impact is a long-term brand issue more than a short-term expense issue,” Mr. de Verteuil said in an interview. “That’s tougher for the market to evaluate.” He added that it’s hard to measure the impact of cyberattacks on share price because companies are measured relative to their sector, and a cyberattack on one company can hurt investor confidence in others like it.

“Whatever the evidence to date, we believe that the frequency and severity of cyber-attacks will increase over time,” Mr. de Verteuil wrote in the report. “Shrewd investors will need a series of questions that provide insight into how seriously the c-suite of a company takes cyber-risk.””

It’s no surprise that this would be the case. As cyber-protection tools have become more sophisticated, victims of cyberattacks are being scrutinized rather than pitied. It is shocking to think that companies in 2017 would not take steps to protect their proprietary data more carefully, or implement corporate policies to avoid having employees fall for phishing schemes. And yet as we know, this is all too often the case.

There is no excuse for this, and there is no reason to let your company become the next victim of the world’s cybercriminals. With the help of Evizone Secure Communications (ESC) and Evizone Communications Governance (ECG), you can be sure that your most sensitive files are protected by our state-of-the-art software.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

A (cyber) war with North Korea has already been waged for years

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

For a country with notoriously limited internet access, North Korea has been surprisingly aggressive with their cyberattacks over the last couple of years. Although a geopolitical storm is brewing between the United States and the Hermit Kingdom, a digital battle has already been fought for some time. Western governments and companies should brace for this cyberwar to heat up even more as the verbal threats fly.

It was reported this week that individuals involved with U.S. defense contractors were baited by Lazarus, the infamous hacker group believed to work for the North Korean authorities. This is the same group responsible for the 2014 Sony hack, a retaliation for the production of The Interview, a comedy depicting the assassination of Kim Jong-Un.

The group is also thought to be behind the WannaCry ransomware attack earlier this year. WannaCry affected over 300,000 people in 150 countries, notably by crippling the computer system of Britain’s National Health Service (NHS), causing surgery delays and emergency room shutdowns. It was the largest ransomware scheme in history, affecting banks, telecommunications companies, and a host of players in other vital sectors.

The latest hack was announced by Palo Alto Networks on Monday. They reported that weaponized Microsoft Office Documents were posted online using the exact copy of publicly available job descriptions for U.S. defense contractors and hosted on compromised systems. While it is unclear how the documents were distributed to contractors and if any were fooled by the postings, the malware was clearly targeted to those who may hold in their networks very sensitive information about U.S. military secrets and other government information.

As we have repeated many times, anyone acting as a supplier to the government or major companies is at great risk of being targeted by cybercriminals.

With the situation in North Korea escalating, companies and contractors everywhere need to take a serious look at their digital weaknesses and assess how to strengthen their cybersecurity capabilities.

The best way to do this is to use Evizone Secure Communications (ESC) and Evizone Communications Governance (ECG). Sign up for a free trial of our software and see for yourself how our closed communication and data storage system can protect your most precious information from unwanted intrusions.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Will NAFTA 2.0 compromise your data?

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

The renegotiation of the North American Free Trade Agreement (NAFTA) is slated to begin on August 16, and it’s top of mind for government officials in the U.S., Canada, and Mexico.

U.S. President Donald Trump made the renegotiation a key plank of his campaign platform, though it now seems like his government intends to enter the talks with a scalpel rather than the promised axe. Changes to the trade of goods and services will likely resemble modernization rather than a protectionist scale-back, as many worried about.

Yet even small changes could have exponential consequences, as many have pointed out with the issue surrounding copyrights and patents. There are similar concerns around cybersecurity, an issue that wasn’t of great concern when NAFTA commenced in 1994.

As Motherboard reports, privacy experts are “concerned American law enforcement or spy agencies could get access to Canadians’ sensitive information.” This is because the United States has indicated “it wants to end any regulations that restrict cross-border data flow, arguing they prevent US-based cloud storage companies from doing their business there.”

Data stored on Canadian servers are subject to the Charter of Rights and Freedoms and other Canadian privacy laws, but it does not apply to Canadian data stored on foreign servers. Canadian data stored on U.S. servers don’t benefit from American protections.

As a result, both British Columbia and Nova Scotia have implemented rules requiring government agencies to store their data in Canada. The U.S. administration sees these rules as unfair.

Critics cited in the article point out that that Canadian officials already share way too much information with the United States, and that data might not be safer on either side of the border.

Under these conditions, can Canadians ever expect to keep their data safe from prying eyes?

With Evizone, the answer is yes.

All data trusted to us through Evizone Secure Communications (ESC) and Evizone Communications Governance (ECG) gets stored in certified high-security data centers. Our patented software is the strongest commercially available system for the secure exchange and compliance archiving of electronic communications, and all files are protected by our proprietary double layer military-grade encryption.

Do give us a call to learn more, or visit us at https://evizone.com/free-trial/ for a free trial of Evizone Secure Communications and Evizone Communications Governance.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

A new attack on HBO

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

You’d think after the multitude of examples of cyberattacks on titans of the entertainment industry – most notably the gargantuan Sony hack in October 2014 – that companies in that sector would be rushing to adequately protect their online assets.

Unfortunately, you’d be wrong. Not long after the most recent season of Netflix’s Orange is the New Black was stolen by hackers, cable TV powerhouse HBO suffered a cyberattack:

…upcoming episodes of a couple series and at least one alleged script or treatment have been put online by hackers who breached the company’s systems — with more threatened to be coming soon.

“HBO recently experienced a cyber incident, which resulted in the compromise of proprietary information,” the network confirmed in a statement. “We immediately began investigating the incident and are working with law enforcement and outside cybersecurity firms. Data protection is a top priority at HBO, and we take seriously our responsibility to protect the data we hold.”

Hackers claimed to have obtained 1.5 terabytes of data from the company. So far, an upcoming episode of Ballers and Room 104 have apparently been put online. There is also written material that’s allegedly from next week’s fourth episode of Game of Thrones. More is promised to be “coming soon.”

Many hacks occur when third-parties, who have crucial proprietary information and files, are attacked by cybercriminals. That was the case with Netflix: hackers were able to steal Orange is the New Black by gaining access to the network of Larson Studios, an audio post-production company. It wasn’t Netflix that was attacked, but rather a vendor to the company. In some cases, the hackers gain access to corporate secrets through spear phishing schemes, in which any and all employees can unknowingly become the gateways to their company’s most sensitive information due to poor email practices.

Anyone acting as a third-party supplier to major companies is at great risk and must take steps to protect their assets. If they fail to do this, they risk losing the confidence of their clients. These types of attacks aren’t going away anytime soon. In fact, they will get more common.

Services like Evizone help to ensure that proprietary information is protected with the strongest cybersecurity technology available on the market.

Don’t wait until it is too late to act!


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

End to End Encryption and Proof of Supervision: Who Wins?

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Australia’s recent move to ban end to end encryption puts the spotlight on the conflict between the right to privacy and a country’s responsibility to protect its citizens. Australian Prime Minister Malcolm Turnbull explained  “we need to ensure that the internet is not used as a dark place for bad people to hide their criminal activities from the law” as a justification for banning end-to-end encryption. We agree entirely, but this does not justify a lack of due process and unreasonable invasions of personal privacy by unaccountable governments.

In reality, the mathematical encryption of data is no more a declaration of guilt than locking the doors to your house means you have something to hide. We believe it to be the right of every citizen, within reason, to protect their data as they would any other possession.

And while encryption and protection are at the core of our business, we equally believe in the need for transparency; when required by the law or fiduciary obligations as it is for most organizations.  The need for transparency in the workings of an organization is just as imperative as the need for security. As Evizone chairman Bill Wells puts it:

“Imagine if employees or public servants are all communicating with unbreakable encryption so no one can monitor what actually is going on. This is why compliance regulations and the duty to provide “Proof of Supervision” exist. The need to maintain transparency and oversight while still preserving appropriate security of sensitive information is critical. Unbreakable encryption and “Proof of Supervision” are mutually exclusive.

It is a difficult needle to thread, but we have done it at Evizone. Information is secure when it needs to be, but transparency and control are maintained and “Proof of Supervision” is unquestioned. Give us a call and we will be happy to show you how we do it.”

At Evizone you can be sure your communications are secured with the strongest security commercially available and we will defend your right to due process. At the same time you can also be sure that you have total transparency and oversight of the content of your organization’s communications – all managed by policy and with iron clad Proof of Supervision. Falling for the “end to end encrypted therefore safe” canard only means assuming an even bigger risk as Proof of Supervision goes out the window. Failure to supervise constitutes gross negligence and can create enormous liability for any organization.

Do give us a call to learn more, or visit us at https://evizone.com/free-trial/ for a free trial of Evizone Secure Communications and Evizone Communications Governance.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

The UN is worried about cybersecurity – they should be

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

The International Telecommunication Union (ITU), a division of the United Nations, recently released their Global Cybersecurity Index for 2017. The report looks at the ability of countries to defend themselves against major cyberattacks – which include shutting down power grids and freezing communications in hospitals.

The agency reports that “there is still an evident gap between countries in terms of awareness, understanding, knowledge and finally capacity to deploy the proper strategies, capabilities and programmes [sic] to ensure a safe and appropriate use of [information and communication technology] as enablers for economic development.”

Reviewing the cybersecurity policies of 193 nations while considering legal, technical, organizational, capacity building and cooperation aspects, the ITU ranked the following as the 10 most prepared countries in the world:

  1. Singapore
  2. United States of America
  3. Malaysia
  4. Oman
  5. Estonia
  6. Mauritius
  7. Australia
  8. Georgia
  9. France
  10. Canada

And since you’re probably wondering who ranks in the 10 worst, they are:

  1. Equatorial Guinea
  2. Yemen
  3. Central African Republic
  4. Dominica
  5. Tuvalu
  6. Timor-Leste
  7. Somalia
  8. Guinea-Bissau
  9. Comoros
  10. Vatican

There is obviously a discrepancy in terms of wealth between these nations, but it is still worrying to see that those considered to be the most prepared are nevertheless highly vulnerable to attacks.

While the United States ranks second best, it still faces a load of problems. We need only to think of the Sony hacks, the election scandals, and the WannaCry and Petya ransomware attacks to know that the government should not be slapping its own back in satisfaction.

One in 131 emails sent around the world are malicious and 15% or more of businesses in the top 10 industry sectors have been attacked. Global ransomware damages are predicted to exceed $5 billion in 2017.

It’s time for countries to develop better cybersecurity contingency plans. Until they do, companies and individuals need to do everything they can to ensure that their own data is well protected.

For a free trial of Evizone Secure Communications and Evizone Communications Governance, visit us at https://evizone.com/free-trial/.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

Use the summer lull to update your cybersecurity protection

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE

The summer provides the ideal time for a number of catch-up activities: you can watch those blockbuster films you missed all year, finally thumb through that pile of subscription magazines, and clean out the old dusty toolshed in the backyard.

The dog days are also a great time for companies to think about their cybersecurity.

An article for SecurityWeek suggests that the vacation period leaves firms open to vulnerabilities:

“With employees travelling, it’s important to address your security posture. Are your assets patched, encrypted and up to date with the latest protection updates as driven by your security posture? If not, can you make this a priority before those assets start traveling to unknown locations in employees’ luggage and carry-on bags?

Within the security organization specifically, have you planned for personnel shortages and coverage while employees take vacation? Do you have contact information for all critical members of the organization and their backups in case a significant incident is discovered? The threat actors in today’s environment recognize that organizations may not be as diligent about monitoring alerts over the summer, and they’ll take advantage of the potential opportunity for increased dwell time. Now is the time to plan and prepare; you may even want to conduct an incident response drill.

In addition to evaluating your organization’s overall security posture and your team’s readiness to handle staffing challenges, the summer gives individuals on your security team the chance to expand their roles and responsibilities. Are there projects that need additional resources? Processes that need to be improved or standardized? The summer is a fantastic time to do an overall evaluation and put in place new challenges and opportunities for security staff members to undertake in the second half of the year.

As you evaluate your security program, think about everything you can do to make progress toward your annual goals. How are you expanding the security visibility in your organization? Do you have access to the data sources you need to confidently detect and respond to threats in your organization? Do you have processes in place to efficiently handle incidents? How have these things changed over the course of the year so far? With half the year already behind you, it’s important to step back and evaluate the overall security posture.”

Evizone provides the ideal protection against theft and data breaches. No information transmitted through our secure communications software is stored on the devices involved. Instead, data resides on servers protected with military-grade encryption.

Take advantage of our FREE TRAIL and rest easy, margarita in hand, knowing that your company is utilizing the strongest commercially available communication tool on the market.


About Evizone Ltd.
Evizone Ltd. is a revolutionary secure communications, encryption and compliance software and service provider based in Montreal, Quebec, Canada. Evizone offers innovative enterprise solutions in secure messaging (next generation beyond encrypted e mail) and encryption, encryption at rest, regulatory compliance, compliance archiving, WORM compliance, 17a-4 compliance, document life cycle management and communications governance and risk management. Evizone’s services protect organizations through best in class security, encryption, recipient controls, document life cycle management, discovery management, compliance management, compliance archiving, tamper proof WORM and 17a-4 compliance archiving and complete audit records against the enormous damage caused by communications breaches. Evizone’s patented technologies offer a level of security impossible to obtain with conventional or encrypted email and fast, powerful, user friendly compliance archiving. Evizone’s services are immediately available on multiple platforms and provide the strongest commercially available communications security and compliance archiving. You can follow Evizone on Facebook, Twitter, and LinkedIn.

Contact:
Tom Kott, HATLEY Strategy Advisors, 514.316.7082, tkott@hatleystrategies.com

 

LEARN MORE                     FREE TRIAL                          CONTACT EVIZONE