Blog
How You Can Obtain Reasonable Security
What is a reasonable amount of security? Is it good enough? These are the questions businesses have to ask themselves. There is so much news
GDPR Fines Are Increasing: How do you Make Sure you Stay Compliant?
Navigating government regulations can always be a challenge. One thing is certain, you do not want to be caught out of compliance and have to
6 Things You Need to do After a Cyber Security Breach
The unthinkable has happened: your company has suffered a breach. If you are wondering how you are going to recover, here are 6 things that
What Canada’s New Digital Privacy Act Could Mean For Businesses
Yesterday, Innovation Minister Navdeep Bains introduced the Digital Charter Implementation Act. The new act, officially called an “Act to enact the Consumer Privacy Protection Act
6 Reasons You Need to Invest in Compliance Managment
1. Your organization must comply to multiple standardsDepending on your product/service offering, your organization may have to comply with multiple standards. For example, a healthcare
Don’t Want to Pay Fines, Don’t Get Breached!
What do British Airways and Marriott Hotels have in common? Both were handed substantial fines by the UK’s Information Commissioner’s Office (ICO) over cyber security
What Global Privacy Laws Should You Worry About?
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
Why You Need MGRC?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
How often Should You Update Your Cyber Security Policy?
Often is the simple answer. Cyber security threat landscape is constantly changing, and policies and procedures need to be updated on a regular basis to
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)