Blog
Why Law Firms Need A Managed Security Services Partner
You don’t need to be a cyber security expert to know that there is an increase in cyber attacks against law firms. Last year’s high
Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?
The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
5 Tips to Reduce The Risk of a Cyber Attack Against Your Business
Many organizations simply don’t realize the cyber risk that is out there for their businesses. In some cases, they think they are too small to
How You Can Obtain Reasonable Security
What is a reasonable amount of security? Is it good enough? These are the questions businesses have to ask themselves. There is so much news
GDPR Fines Are Increasing: How do you Make Sure you Stay Compliant?
Navigating government regulations can always be a challenge. One thing is certain, you do not want to be caught out of compliance and have to
What Canada’s New Digital Privacy Act Could Mean For Businesses
Yesterday, Innovation Minister Navdeep Bains introduced the Digital Charter Implementation Act. The new act, officially called an “Act to enact the Consumer Privacy Protection Act
6 Reasons You Need to Invest in Compliance Managment
1. Your organization must comply to multiple standardsDepending on your product/service offering, your organization may have to comply with multiple standards. For example, a healthcare
What Global Privacy Laws Should You Worry About?
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)