Blog
Patch Your Systems Now! Microsoft Unveils Update to Fix 120 Vulnerabilities
Patching systems for vulnerabilities is not the time-consuming process that some people would have you believe. Even it was a time-consuming process, not patching systems
Why UberEats Accounts Shared on the Dark Web is Bad for Your Business
Cyber security firm Cyble has recently discovered that the user records from UberEats have been leaked onto the dark web. Researchers at the firm analyzed
Why You Should Worry That Hackers Have Leaked Your VPN Password
A ZDNet report recently revealed that the passwords for over 900 Pulse Secure VPN Severs were leaked onto a Russian hacker site. Bank Security shared
Garmin, Canon Breaches Prove You Need a Breach Readiness Plan
If you work in cyber security, this week’s headlines will have you wondering what is going on in the world. Garmin and Canon, two very
3 Reasons the Garmin Ransomware Attack is a Big Deal
On July 27th, Garmin confirmed that it had been the victim of a cyber attack, which began on July 23rd. The attack affected Garmin’s wearables,
Why Executives Are Prone to Phishing Attacks
When in comes to finding the weak link in the security chain, you will find it in people. People are human and make mistakes. Hackers
How COVID-19 has Strengthened Cyber Security Attacks in 2020
COVID-19 has changed virtually all aspects of our lives. Our personal lives are certainly different, and our business lives have also been disrupted. COVID-19 has
Boost Your Revenue With a Compliance and Cyber Security Plan
You already know that a breach can cripple your business. A breach can negatively affect your business not just in the cost of dollars spent
Is a Vulnerability Assessment Enough?
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)