Blog
Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?
The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their
Oh No, Not the Beer! Brewery Breach Stops Beer Production
Molson Coors disclosed on Thursday that it had suffered a breach that disrupted operations and beer production. In a filing with the U.S. Securities and
What is Your Plan if Your Data Centre Burns Down?
If you run a business, you know it is always good to have a plan. You plan for growth, and you also build contingency plans
Things you Need to Know About the Microsoft Exchange Attack
By now you may have heard that Microsoft has suffered a major breach to it Exchange Software. According to KrebsOnSecurity, At least 30,000 organizations across
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
Why Human Error is Your Biggest Cyber Security Risk
When it comes to cyber security, your business’s biggest risk factor is your own staff. Researchers from Stanford University and a top cybersecurity organization found
Signs you Need to Upgrade Your Breach Readiness Plan
Everyone knows that in today’s connected world, businesses need to have a breach readiness plan. But did you know that this plan needs to be
3 Ways to Avoid Phishing Email Scams
Phishing scams have been around for a long time. Phishing emails work often enough that there is no reason for scammers to stop. Indeed, there
Why Passwords are a big Problem
Passwords are everywhere! We need them to access workstations, mobile devices, social media and ecommerce. The trouble with passwords is that they are weak when
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)