Blog
How to Flatten the Curve on COVID-19 Cyber Security Risk
Non-essential businesses in most parts of the world have shut down to flatten the curve on COVID-19 cases. Many office workers are now working from
Survey Says Cyberattacks are on the Rise due to COVID-19
In mid-April, ISACA surveyed more than 3,700 IT audit, risk, governance and cybersecurity professionals from 123 countries to assess the impact of COVID-19 on their
Why is a Remote COVID-19 Vulnerability Assessment Essential?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
Why Phishing Awareness is Important for Executives Too
When in comes to finding the weak link in the security chain, you will find it in people. People are human and make mistakes. Hackers
Ecommerce Opportunities and Risks During COVID-19
If there is one area of the economy growing out of the COVID-19 pandemic, it is of Ecommerce. In a press release issued by ACI
More COVID-19 Scams to Watch For
Since COVID-19 has taken hold of the world, hackers have taken the opportunity to profit from this. In our April 10th blog, we wrote about
Best Practices for Secure Video Conferencing
In the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to
Wasaga Beach Municipal Staff Not Working Remotely to Avoid Data Breach
Since the COVID-19 pandemic, many organizations have been sending staff home and have set up remote work spaces. An article in Barrie Today talks about
Why Education is More Susceptible to Cyber Attacks During COVID-19
With schools forced to close in most jurisdictions, children are now being forced into online learning environments. Like what we have seen with remote workers,
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)