Blog
How your Compliance and Cyber Security Efforts can Bolster Revenue Growth
You already know that a breach can cripple your business. A breach can negatively affect your business not just in the cost of dollars spent
Is Ransomware Recovery a Scam?
ProRepublica has published a story about how some ransomware recovery companies are just paying the ransom on behalf of their customers.
Favourite Security Memes
Merry Christmas everyone! As we near the end of the year, I thought I’d share some of my favourite cyber security memes and graphics. At
City of Woodstock Ransomware Attempt Update
You may recall in September that it was reported that the City of Woodstock suffered a breach. At the time, it was unknown if there
Social Engineering: Are you Prepared?
Exactly what is social engineering? It sounds like something complicated and technical, when the reality is that it’s not. It’s a trick used by criminal
LifeLabs Suffers Data Breach Affecting 15 Million People in BC and Ontario
LifeLabs announced yesterday in an open letter to customers that it has suffered a cyber attack affecting 10 million customers in Ontario, and 5 million
Cyber Attacks Surge Over the Holidays
Don’t let the holiday season lull you into a false belief that your computer, networks and internet connected devices will be safe from hackers. Criminals
CRTC Announces Program to Protect Canadians from Scammers
The Canadian Radio and Telecommunications Commission announced on Monday that it would implement a new framework meant to combat caller ID spoofing, by September 30,
10 Tips For Detecting Phishing Emails
The thought of phishing emails is enough to panic most seasoned cyber security professionals. Afterall, they spend a lot of time and money to beef
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)