Blog
Can Bad Cyber Security Hygiene Get Your Business In Trouble with the SEC? Yes!
The U.S. Securities and Exchange Commission (SEC) has recently fined First American Financial Corporation (FAFC) $487,616 for deficient disclosure controls and procedures related to cybersecurity
Why a Breach Readiness Plan is so Important
Having a proactive plan to respond to a cyber security breach just makes sense. Reacting to a breach can set your organization back in more
Top 5 Cloud Cyber Security Threats
Moving to the cloud has so many strategic advantages for business. The key advantages, especially during the COVID-19 pandemic, is that employees can work remotely
Top 5 Things to Look for in a Managed SOC service
If you are running a business, you know that you need a team who can keep your security perimeter constantly updated against new and evolving
Should Water Treatment Facilities Allow Remote Access?
Should water treatment staff be allowed to remote login to monitor systems? This is becoming a hot button issue with the Oldsmar breach in February
Why Boards Need to Take Cyber Security Seriously
Do executive boards of companies take cyber security seriously enough? According to the UK’s new CEO of the National Cyber Security Centre (NCSC), Lindy Cameron,
Study Says Manufacturing Firms are Learning Cyber Security the Hard Way
When it comes to cyber attacks, we know that the healthcare sector and government agencies are some of the top targets. But what about the
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
Signs you Need to Upgrade Your Breach Readiness Plan
Everyone knows that in today’s connected world, businesses need to have a breach readiness plan. But did you know that this plan needs to be
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)