Blog
Can you Afford a Data Breach?
A recent Forbes magazine article, “What is the Cost of a data Breach,” has reported on how much money a breach can cost your organization.
New Ransomware Attacks NAS Devices: How to Protect Your Organization From This Threat
Ransomware continues to be the big story of the year. We see over and over how companies are targeted, their data is scrambled, and then
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Give the Gift of Breached! This Holiday Season
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
New Report Says Holiday Hacking to Increase
Happy Black Friday! While some of you will trek out to the shops today, many of you will decide to stay in and shop from
What is MGRC and Why You Need it?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Stay Cyber-Safe When Shopping Online
As the holiday season kicks off, shoppers everywhere are more and more frequently opting to use their credit cards from the comfort of their homes,
2019 Reports of Ransomware are Outpacing 2018
According to a Chubb Insurance report, there have already been more instances of ransomware than in all of 2018. The report, titled, “Adapting to the
Why Is It Important to Automate Compliance Activities?
Compliance is an essential part of any company’s information security strategies. It governs businesses’ best practices and ensures that they keep their customers’ information safe.
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)