Blog
Should Water Treatment Facilities Allow Remote Access?
Should water treatment staff be allowed to remote login to monitor systems? This is becoming a hot button issue with the Oldsmar breach in February
Why Boards Need to Take Cyber Security Seriously
Do executive boards of companies take cyber security seriously enough? According to the UK’s new CEO of the National Cyber Security Centre (NCSC), Lindy Cameron,
Is it Time to Stop Relying on SMS for Multifactor Authentication?
Multifactor authentication is a way of authenticating to a device or software with a password plus another factor, usually one-time code or biometrics. The easy
Is DMARC the Answer to the Phishing Problem?
Phishing is a global problem plaguing many businesses. The statistics on phishing alone are scary. These three in particular should scare you: 65% of U.S.
How to Keep Data Safe While Working from Home
The COVID-19 pandemic has changed the way we view office work. Roles that we once thought could only be done in the office are now
Cyber Crime Loses Exceed $4.2 Billion: FBI
The FBI has just released its Internet Crime Complaint Center (IC3) 2020 Internet Crime Report. Some of the statistics from this report may shock you.
Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?
The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their
Oh No, Not the Beer! Brewery Breach Stops Beer Production
Molson Coors disclosed on Thursday that it had suffered a breach that disrupted operations and beer production. In a filing with the U.S. Securities and
Things you Need to Know About the Microsoft Exchange Attack
By now you may have heard that Microsoft has suffered a major breach to it Exchange Software. According to KrebsOnSecurity, At least 30,000 organizations across
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)