Blog
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
5 Critical Password Rules Your Employees Need to Follow
Passwords are the keys that unlock so much critical data. They allow your employees access to systems to enable them to do their jobs. However,
Will a Ban on Ransomware Payments Make Ransomware Go Away?
New York, North Carolina, Texas, and Pennsylvania are considering a ban on businesses making ransomware payments after some high-profile attacks against Colonial Pipeline and JBS
Microsoft Warns of New Phishing Attack Targeting Office 365 Users
Microsoft is warning users of a new type of phishing attack that involves a call centre to help you download malware. Using a call centre
Why Cyber Awareness Training Should be Tailored to Employee Function
We often hear about cyber attacks that target certain types of employees, whether it be by function or location. So, does it not make sense
How Fast Can a Leaked Password be Exploited by Hackers?
It’s an all too familiar story. Company X get’s breached and you receive an email telling you that your password may have been stolen and
Is Your Organization Prepared for Cyber Threats Upon a Return to the Office?
It doesn’t seem that long ago we were all warned about the cyber risks associated with a mostly remote workforce. Now it seems there is
Will the Increase in Ransomware Force Your Business to Increase its Cyber Defenses?
There is no doubt that ransomware continues to still be considered a big threat to businesses. The UK’s National Crime Agency (NCA) is warning in
Top 7 Mistakes Made When Implementing Cyber Awareness Training
As important as it is to implement a cyber awareness program, it is just as important that it be effective. So, to ensure your staff
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)