Cybersecurity Awareness Blog

 Find the best information on how to protect your organization against cyber threats and empower team members to take an active role within your organization.

homepage, Top News, bilingual David Shipley homepage, Top News, bilingual David Shipley

Securing Canada’s Digital Future Requires Federal Action Now

Earlier this week, Beauceron Security CEO, David Shipley, was invited to speak alongside Dr. Ken Barker, Professor at the Institute for Security, Privacy and Information Insurance at the University of Calgary and Juliette Kayyem, a Belfer Lecturer on International Security for the Harvard Kennedy School of Government, at the Standing Committee on Public Safety and National Security.

Read More
homepage David Shipley homepage David Shipley

Beauceron Security is a CyberTech 100 Company

FinTech Global released their 3rd annual CyberTech 100 list last Tuesday and Beauceron Security is proud to announce that they have been featured on the list. The announcement came days prior to the company’s 5 years in business anniversary.

Read More
homepage David Shipley homepage David Shipley

Beauceron Security Celebrates Its 5th Anniversary!

Beauceron Security Celebrates 5 Years of Empowering People to be in Control of Technology.

Fredericton, NB – June 2nd, 2022: Beauceron Security is a fast-growing B2B SaaS company looking to change behavior at a fundamental level – not just sell security software. The company’s founders recognized a key problem in cybersecurity awareness programs: the lack of education and focus on people. With empowering people as the guiding focus, Beauceron Security was founded. 5 years later, people remain the central focus and guiding principle.

Read More
homepage, Top News, bilingual David Shipley homepage, Top News, bilingual David Shipley

Multi-Factor Authentication (MFA): What it is and Why We Should Use it

Enabling two-factor authentication or multi-factor authentication is an excellent way to add that extra layer of protection to work or personal accounts. In this blog, you’ll learn about the different forms of authentication and why enabling either two-factor authentication or multi-factor authentication is considered a cybersecurity best practice.

Read More
Top News, homepage, bilingual Dylan Gallant Top News, homepage, bilingual Dylan Gallant

Cyber True Crime: The Affiliate Part 5

Welcome back to Part 5 of the Cyber True Crime series The Affiliate. In past blogs, we covered the history of NetWalker, how a RaaS ransomware gang functions, how Sebastien Vachon Desjardins, or the Affiliate, attempted to hide his criminal activity through international servers and in our last blog the organizations he targeted in his attacks. In this installment, we’ll begin to unravel how the FBI began tracking the Affiliate down through the international servers and his multiple email addresses.

Read More
homepage, Top News, bilingual David Shipley homepage, Top News, bilingual David Shipley

Cyber True Crime: The Affiliate Part 3

Welcome back to Part 3 of the cyber true crime series The Affiliate. In Parts 1 and 2 we went over how a ransomware gang typically operates, how an organization finds out they have been the target of a NetWalker ransomware attack and how one becomes involved in the criminal organization. In this installment, you’ll learn how an international server works and how the Affiliate used them.

Read More
bilingual, homepage, Top News David Shipley bilingual, homepage, Top News David Shipley

In for the Long Haul: The Long-Term Effects of a Data Breach for SMBs

It’s a common belief that cybercriminals target large businesses for data breaches; however, the truth is that in 2021, small and medium businesses (SMBs) were the biggest and most easily accessible targets for data breaches. Sontiq’s Mid-Year 2021 report concluded that 69% of all data breaches for this year so far have been to small businesses.

Read More
homepage, Top News, bilingual David Shipley homepage, Top News, bilingual David Shipley

Cyber True Crime: The Affiliate Part 2

Welcome back to the cyber true crime blog series The Affiliate. Part 1 provided an introduction to ransomware, how RaaS works and where the ransomware gang we’ll be focusing on, NetWalker, fits into the narrative. In this second installment, we unravel how one becomes a member of NetWalker and the sort of malicious activities that the ransomware gang participated in.

Read More
homepage David Shipley homepage David Shipley

Beauceron Security's 2022 Cybersecurity Predictions

This year we sat down with Beauceron Security CEO, David Shipley, and asked him what his 2022 cybersecurity predictions are. You can listen to David’s full predictions below or keep reading to see a condensed version of what we believe the 2022 cyber landscape may have in store.

Read More
homepage, Top News David Shipley homepage, Top News David Shipley

Dear Ransomware Gangs: An Open Letter to Cyber Criminals

Last week was an important week for Canada’s stance against ransomware gangs. On Monday, the Canadian Centre for Cyber Security released their “Open letter to Canadian organizations about ransomware.” On Tuesday, CBC’s As it Happens reported on the recent arrest of an Ottawa man allegedly accused of participating in a ransomware gang. Beauceron Security CEO, David Shipley, was interviewed by As it Happens and gave his perspective on the situation.

To listen to David’s full interview with As it Happens, click here.

Read More
bilingual, homepage, Top News David Shipley bilingual, homepage, Top News David Shipley

How to Foster Positive Behavioral Change

While it may be easy to place the blame on people for data breaches and other cybersecurity incidents, the truth is that people are an organization’s first and best line of defense. Instead of viewing people as the victim, or punishing them for risky cyber behavior, it’s time to change the narrative and instead focus on empowering them through a cybersecurity culture that focuses on positive behavioral change.

Read More
bilingual, homepage, Top News David Shipley bilingual, homepage, Top News David Shipley

Ransomware Basics

Ransomware, or ransom malware locks users out of their device or just certain files which can only be decrypted in exchange for a ransom. Back in the 1980s when ransomware attacks were just beginning to appear, cybercriminals would accept payment by mail. However, today payments are made via cryptocurrencies like Bitcoin. In the early days of ransomware, cybercriminals mostly targeted individuals, but gradually shifted to targeting businesses small and large which offered a higher pay out. You don’t even need to be especially technologically talented to become a ransomware attacker now with the growth of ransomware-as-a-service (RaaS).

Read More
homepage, Top News David Shipley homepage, Top News David Shipley

Data Encryption and Ransomware

Data encryption is a way to keep your data safe by changing it from plain text to ciphertext. Encrypted data can be accessed by someone who has an encryption key and decrypted data can be accessed with a decryption key. Unencrypted data remains a liability and cyber risk for organizations in the event that a ransomware gang steals their data and publishes it online.

Read More