Blog
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
5 Critical Password Rules Your Employees Need to Follow
Passwords are the keys that unlock so much critical data. They allow your employees access to systems to enable them to do their jobs. However,
Top 3 Cyber Security Challenges Facing SMBs
If you are running a SMB (Small and Medium-sized Business), you know that there are many challenges to facing your business. One of those challenges
5 Critical Password Best Practices You Need to Know
We have seen many stories where hackers have gained access to accounts from an easily guessed password (think Donald Trump MAGA2020, Solarwinds123, and Oldsmar Water
Top 5 Cloud Cyber Security Threats
Moving to the cloud has so many strategic advantages for business. The key advantages, especially during the COVID-19 pandemic, is that employees can work remotely
2 Canadian Universities hit by Cyber Attacks this Month
Both Simon Fraser University in BC and Lakehead University in Thunder Bay and Orillia were recently hit by a cyber attack this month. Students and
Why Won’t Ransomware Stop? Hint: Because you Keep Paying
Ransomware is one of the biggest challenges facing businesses today. In case you haven’t heard, ransomware is an attack where cyber criminals break into your
WhatsApp Delays Privacy Update in Response to Backlash
WhatsApp announced on Friday that it is going to postpone an update to its privacy policy in response to concerns from Security advocates. Originally, users
Ransomware is More About Extortion, Less About Encryption
When we think of ransomware attacks, we think usually of hackers denying an organization access to its own data until it pays a ransom. In 2020,
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)