Blog
5 Steps to Performing Better Vulnerability Assessments
Performing a vulnerability scan once a year just to meet a compliance requirement isn’t enough to secure your network. To improve your security posture and
8 Steps to Building a Strong Breach Readiness Plan
You know that reacting to a breach can set your organization back in more ways than just the financial impact. By implementing a proactive approach
Top 5 Things to Look for in a Managed SOC service
If you are running a business, you know that you need a team who can keep your security perimeter constantly updated against new and evolving
Why Your SMB Needs a SOC and NOC
A Security Operations Centre (SOC) and Network Operations Centre (NOC) are an important part of your business’s technology and cyber security strategy. According to Gartner,
Why the Oldsmar Water Facility breach is a Wake Up Call to Update Cyber Security Measures
It sounds like something from a spy movie. Someone tries to poison a small city’s water supply by remotely accessing the computer for the water treatment
Did you know 25% of Canadian Small Businesses Have Suffered a Cyber Attack Since The Start of COVID-19?
A new study by the Canadian Federation of Independent Business (CFIB) found that 25% of their members have suffered a cyber attack since March 2020.
Why You Need a Remote COVID-19 Vulnerability Assessment?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
5 Cyber Security Myths That Could Destroy Your Business
Many business leaders tend to ignore cyber security when it comes to their business plans. They ignore it in many cases because of these widespread
Why You Need MGRC?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)