Blog
Why the Oldsmar Water Facility breach is a Wake Up Call to Update Cyber Security Measures
It sounds like something from a spy movie. Someone tries to poison a small city’s water supply by remotely accessing the computer for the water treatment
And Another Cyber Security Firm Suffers a Breach. Is this a Trend?
Stormshield, a French cyber security firm, is the latest cyber security firm to suffer a breach. While not the first cyber security firm to be
How to Avoid Falling Victim to a Ransomware Attack, Twice
The UK’s National Cyber Security Centre (NCSC) recently published a blog post detailing how a company fell victim to the same ransomware attack twice. The
How Quickly Could Your Business Recovery From a Cyber Attack?
Imagine the unthinkable happened and your business suffered a cyber attack. How long to do think it would take you to recover from it?
Costs are Higher for Firms That Don’t Have an Incident Response Plan: Study
A recent study by Cyentia Institute shows that companies that don’t have a good cyber incident response plan suffered losses 2.8 times greater than their
Death Due to Ransomware Reported in Germany
A ransomware attack on a German University and affiliated hospital has indirectly resulted in death for a patient. Last week, a woman seeking urgent care
Why You Need a MSSP as a Business Partner
An MSSP is a Managed Security Services Partner. MSSPs are responsible for Identifying and remediating threats, and for protecting your environment 24/7. Some of managed
Marriott Suffers a Second Data Breach
Who says lighting doesn’t strike the same place twice? On March 31, hotel chain Marriott announced that they had suffered another data breach. The first
How to get the Best ROI for Your SIEM?
So, you have a purchased a SIEM (Security Information and Event Management) solution. Now that you have made the investment, the time has come to
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)