Blog
Why Is It Important to Automate Compliance Activities?
Compliance is an essential part of any company’s information security strategies. It governs businesses’ best practices and ensures that they keep their customers’ information safe.
Could Your Cybersecurity Strategy Prevent an Insider Breach?
A survey of IT Security professionals conducted by Imperva has found that 43% believe they could successfully carry out a cyber attack on their own
The ROI on Cybersecurity: How a Lack of Security Can Cost You Your Business
Demonstrating ROI on cybersecurity is notoriously difficult and is one of the reasons we see so many breach stories in the news. Breaches that affect
Ransomware Attacks on the Rise in Canada
A recent report by CBC news, claims that ransomware is on the rise in Canada. Unless you have been living under a rock, you would
Five Sessions You Don’t Want to Miss at SecTor 2019
SecTor, Canada’s premier cybersecurity conference, is now underway. It has grown significantly in the past few years and is the place to be for those
Cybersecurity Problems That Will not go Away
Last week, I had the pleasure of listening to Dave Millier, founder of Uzado and author of Breach!, speak about Cybersecurity. He spoke about some
2018 Study: Canada Ranks Number 1 as a Target for Phishing Scams. Has Anything Changed?
According to the RSA Quarterly Fraud Report for the period between January 1 to March 31, 2018, Canada, the U.S. and India were the top
Another Canadian City Suffers a Breach
On Sunday morning, the City of Woodstock suffered a network breach when a virus got into their systems and prevented access to emails and data.
Half of all Canadians Have had Their Data Breached
A recent report by CTV News says that over 19 million Canadians have had their personal data breached between November 2018-June 2019. The numbers come
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)