Blog
Do’s and Don’ts for Cyber Security Awareness Training
It’s clear that staff can be the weak point in the cyber security chain. Providing the right type of cyber security awareness program can mean
Travelex Suffers Ransomware Attack and Potential Data Breach
UK based data currency exchange Travelex suffered a ransomware attack on New Year’s Eve. A ransomware gang called Sodinokibi has told the BBC it is
Cyber Security Trends to Watch for in 2020: Part 2
The new year is here! What does the future of cyber security hold for us in 2020? Will it be more of the same? This
Cyber Security Trends to Watch for in 2020: Part 1
The new year is here! What does the future of cyber security hold for us in 2020? Will it be more of the same? This
Cyber Security New Year’s Resolutions
2020 is here! As we approach the end of the first full week back on the job this year, here are some thoughts for resolutions
Is Ransomware Recovery a Scam?
ProRepublica has published a story about how some ransomware recovery companies are just paying the ransom on behalf of their customers.
Favourite Security Memes
Merry Christmas everyone! As we near the end of the year, I thought I’d share some of my favourite cyber security memes and graphics. At
City of Woodstock Ransomware Attempt Update
You may recall in September that it was reported that the City of Woodstock suffered a breach. At the time, it was unknown if there
Social Engineering: Are you Prepared?
Exactly what is social engineering? It sounds like something complicated and technical, when the reality is that it’s not. It’s a trick used by criminal
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)