Blog
Staying Cybersafe During The COVID-19 Pandemic: Part 1
While many of us around the globe are worried about catching this nasty virus, hackers are finding that this is a perfect time to unleash
Shocking News: The Hackers Lied!
Recently, Bleeping Computer posted an article about how the major players behind some of the most destructive ransomware would not target health organizations during the
Ransomware Hackers Claim They Won’t Target Health Organizations During Pandemic
A story in Bleeping Computer last week claims that major hacker groups vow not to target health organizations during the Covid-19 pandemic. The story centres
Coronavirus Malware Update
In our March 9th blog, we talked about how hackers were using the coronavirus to phish end users into giving up sensitive information or click
Cyber Insurance Myths and Misconceptions
As businesses grow more reliant on technology to store and process data, cyber crime is also growing. Imperva’s 2019 Cyberthreat Defense Report says 78% of
Simon Fraser University Latest Canadian Organization to be hit by Ransomware
On March 2nd, Simon Fraser University (SFU) disclosed on their website that they identified a data breach occurred on February 28th. The school said that
Basic Cyber Security Steps
Prioritizing cyber security can seem like a daunting task. If you break the task down into several manageable steps, it becomes much easier to implement.
The Pros and Cons of Cyber Insurance
When you think of business insurance, you think about insuring against the typical things: theft, floods, fire, etc. What about insuring your data against theft?
Can Ransomware Tamper with Critical Infrastructure?
A ransomware strain was discovered last month by security firm Dragos that actively seeks out and forcibly stops applications used in industrial control systems (ICS).
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)