Blog
Global Privacy Laws: What They Have Been and Where They Will go
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
The Pros and Cons of Cyber Insurance
When you think of business insurance, you think about insuring against the typical things: theft, floods, fire, etc. What about insuring your data against theft?
Can Ransomware Tamper with Critical Infrastructure?
A ransomware strain was discovered last month by security firm Dragos that actively seeks out and forcibly stops applications used in industrial control systems (ICS).
What is MGRC and Why You Need it?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Ransomware to Continue in 2020
Ransomware is going to continue to be big news in 2020. The reason is simple: ransomware is a fast, cheap, and effective method of extracting
Yesterday was Data Privacy Day: How did you Celebrate?
Also know as Data Protection Day in Europe, Data Privacy day has been observed on January 28th since 2007. According to Wikipedia, The day is
8 Cyber Security Myths
There is a lot of misinformation out there when it comes to cyber security. Below are 8 common cyber security myths that could cost you
EHealth Saskatchewan Suffers a Ransomware Attack
Saskatchewan’s eHealth agency has been responding to a Ransomware attack since January 6th. At that time, eHealth was notified immediately by their antivirus software, and
Winnipeg-Based Online Pharmacy Breached
Bleeping Computer has reported that Winnipeg based online pharmacy PlanetDrugsDirect has suffered a breach. While there are no details yet on how they were breached,
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)