Blog
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
Why Obtaining Cyber Insurance is Becoming Difficult
As a business owner, you know the importance of insuring your business from things like theft and fire. With more and more businesses online, cyber
Experts Say Testing Backups is Key to Preventing Ransomware Payments
Ransomware continues to be a big problem globally for both large enterprises and small businesses. In the news we hear of big ransomware demands that
The Cost of Cyber Crime Per Minute
Ever think about what the cost of cyber crime is per minute? RiskIQ has, and their info sheet on the costs are frightening. Dubbed “The
Are You Prepared for a Ransomware Attack?
Ransomware is a very destructive attack when launched against businesses. There have been so many news headlines lately about ransomware that you would think most
Backups Save the Day for Most Kaseya VSA Breach Victims
A story in BleepingComputer states that victims of the REvil ransomware attack on Kaseya VSA are refusing to pay the ransom. The reasons: Backups! A
Kaseya Breach Affects 1,000 Companies Worldwide so Far
Another supply chain ransomware attack has so far affected over 1,000 companies worldwide. Kaseya’s VSA platform was attack by the REvil ransomware gang on Friday.
Will a Ban on Ransomware Payments Make Ransomware Go Away?
New York, North Carolina, Texas, and Pennsylvania are considering a ban on businesses making ransomware payments after some high-profile attacks against Colonial Pipeline and JBS
Microsoft Warns of New Phishing Attack Targeting Office 365 Users
Microsoft is warning users of a new type of phishing attack that involves a call centre to help you download malware. Using a call centre
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)