Hexafusion Blog

Hexafusion management team has been serving businesses in Canada and the United States since 2014, providing IT Services such as IT support, IT security, computer support and consulting to small and medium-sized businesses.

Cyberattack Forces Meat Producer to Shut Down Operations in U.S., Australia

meat-industry-cyberattack-hackers

Global food distributor JBS Foods suffered an unspecified incident over the weekend that disrupted several servers supporting IT systems and could affect the supply chain for some time.

The world’s largest meat distributor shut down some operations in both the United States and Australia over the Memorial Day weekend after a cyberattack on its IT systems that could have a significant effect on the food supply chain if not resolved quickly.

0 Comments
Continue reading

Have I Been Pwned teams with FBI, gives open-source access to code

haveibeenpwned

The breach aggregator Have I Been Pwned, one of the most popular tools to test the real-world strength of passwords, made two significant announcements on Friday: A collaboration with the FBI to obtain new, hacked passwords, and contributing some of its code-base to the open-source community.

0 Comments
Continue reading

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

Solarwinds hack

The sprawling SolarWinds cyberattack which came to light last December was known for its sophistication in the breadth of tactics used to infiltrate and persist in the target infrastructure, so much so that Microsoft went on to call the threat actor behind the campaign "skillful and methodic operators who follow operations security (OpSec) best practices to minimize traces, stay under the radar, and avoid detection."

0 Comments
Continue reading

Microsoft Caught Up in SolarWinds Spy Effort, Joining Federal Agencies

Microsoft-solarwinds-vmware-hack

The ongoing, growing campaign is “effectively an attack on the United States and its government and other critical institutions,” Microsoft warned.

0 Comments
Continue reading

With Remote Operations, Security is (Even More) Important

With Remote Operations, Security is (Even More) Important

Since the beginning of the COVID 19 pandemic, it has been clear that many companies were not prepared to continue their operations remotely. This was largely due to their leadership being convinced in recent years that allowing people to work remotely would lead to a considerable reduction in production, leading them to be unprepared to shift to remote functionality. Cybercriminals have taken advantage of many organizations as a result, so today we’ll discuss what needs to be done to secure endpoints from afar.

0 Comments
Continue reading

When the People You Trust Phish You

When the People You Trust Phish You

Having success in business often relies on developing trustworthy relationships. You have to trust your vendors and suppliers to get you the resources you need, you need to trust your staff to complete their tasks without putting your business in harm's way, and you need to trust your customers to buy the products and services that you offer. Running counter to these necessary bonds of trust are people actively soliciting people’s time, energy, money, and attention for their own selfish purposes.

0 Comments
Continue reading

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

Tip of the Week: 5 Ways to Easily Identify a Phishing Attack

If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.

0 Comments
Continue reading