Blog
Cyber Cops Shut Down Major International Malware Syndicate: Are the Good Guys Finally Winning?
Recently, there have been two major takedowns in connection with malware criminal enterprises. European and North American cyber cops have joined forces to disrupt what
Why Data Privacy is Good for Business
Tomorrow is International Data Privacy Day! If you didn’t know, International Data Privacy Day is held annually on January 28 to raise awareness and promote
Biden Beefs up U.S. Cyber Security in Response to SolarWinds Breach
U.S. President Biden has only been president for 2 days, yet it seems he is already doing more for U.S. cyber security than his predecessor.
GDPR Fines Are Increasing: How do you Make Sure you Stay Compliant?
Navigating government regulations can always be a challenge. One thing is certain, you do not want to be caught out of compliance and have to
WhatsApp Delays Privacy Update in Response to Backlash
WhatsApp announced on Friday that it is going to postpone an update to its privacy policy in response to concerns from Security advocates. Originally, users
5 Best Practices For Good Cyber Hygiene
You may be looking at this blog title and wondering “what is cyber hygiene?” And “why do I need it?” When it comes to our
Ransomware is More About Extortion, Less About Encryption
When we think of ransomware attacks, we think usually of hackers denying an organization access to its own data until it pays a ransom. In 2020,
4 Types of Phishing Emails You Need to Watch Out For
There are many email scams out there to watch out for. Most of us now know that there isn’t a Nigerian prince out there wanting
Increase Your ROI With Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. Who doesn’t want an increase in ROI? There is a case
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)