Blog
What a Real-Life Spear Phishing Campaign Looks Like
Most people would like to believe when it comes to a phishing attack, that they won’t be fooled. After all, an email that comes in
How to Protect Yourself From SIM Swapping
SIM swapping occurs when an attacker calls a mobile provider and tricks the telco into changing a victim’s phone number to an attacker-controlled SIM card.
Why Vulnerability Assessments Are Not Enough
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
Basic Cyber Security Steps
Prioritizing cyber security can seem like a daunting task. If you break the task down into several manageable steps, it becomes much easier to implement.
MGM Hotels Guests Have Their Personal Data Exposed on Hacking Website
According to a post by ZDNet, 10.6 million MGM Resorts hotels guests have had their personal details published to a hacking website this week. ZDNet
Why Cyber Security Needs to be Built-in to Every Business Process
Cyber attacks are growing every year. There are all kinds of stats out there to verify this: 78% of organizations worldwide were hacked in 2019.
Simplify Risk Management
Risk management is a vital part of your business operations. Rather than focusing solely on vulnerability reports or remediation activities, risk management takes a more
Breached! A Cautionary Tale You Need to Re-Read
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)