Blog
Why The FireEye Breach is Big News
Earlier this week, FireEye disclosed that they had been breached. Kevin Mandia, Chief Executive officer of FireEye, wrote earlier this week in his company’s blog:
Business Email Compromise Strikes Food Bank
Business Email Compromise is a type of cyber attack where cyber criminals use email to try and steal data or money. This type of attack
Is There a COVID-19 Vaccine Available on the Dark Web?
Yes and no. There are reports that drug dealers are selling what they claim is the Pfizer/BioNTech’s COVID-19 vaccine. So much so that Europol and
5 Ways COVID-19 is Changing The Future of Cyber Security
There is no question that COVID-19 has changed the way we do business. While some of these changes are temporary, many others will likely stick
5 Scary COVID-19 Cyber Security Statistics
The COVID-19 pandemic has brought many challenges to the way we live our lives and how we run our businesses. COVID-19 has also brought about
How to Defend Against a Ransomware Attack
A recent Forbes article details how a company was successfully able to recover from a ransomware attack, without paying the ransom. The company in question
Cyber Safety Tips for Holiday Shoppers
The winter holiday season is upon us. Black Friday and Cyber Monday sales are here! Eric Morris, head of retail at Google Canada, told CTV
What You Need to Know About Spoofing
If your business is not addressing spoofing in its cyber awareness program, it should be. What is spoofing? According to the Government of Canada Get
Why You Need a Remote COVID-19 Vulnerability Assessment?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)