Blog
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
Why Passwords are a big Problem
Passwords are everywhere! We need them to access workstations, mobile devices, social media and ecommerce. The trouble with passwords is that they are weak when
2 Canadian Universities hit by Cyber Attacks this Month
Both Simon Fraser University in BC and Lakehead University in Thunder Bay and Orillia were recently hit by a cyber attack this month. Students and
5 Tips to Reduce The Risk of a Cyber Attack Against Your Business
Many organizations simply don’t realize the cyber risk that is out there for their businesses. In some cases, they think they are too small to
Why the Oldsmar Water Facility breach is a Wake Up Call to Update Cyber Security Measures
It sounds like something from a spy movie. Someone tries to poison a small city’s water supply by remotely accessing the computer for the water treatment
How You Can Obtain Reasonable Security
What is a reasonable amount of security? Is it good enough? These are the questions businesses have to ask themselves. There is so much news
Did you know 25% of Canadian Small Businesses Have Suffered a Cyber Attack Since The Start of COVID-19?
A new study by the Canadian Federation of Independent Business (CFIB) found that 25% of their members have suffered a cyber attack since March 2020.
How to Avoid Falling Victim to a Ransomware Attack, Twice
The UK’s National Cyber Security Centre (NCSC) recently published a blog post detailing how a company fell victim to the same ransomware attack twice. The
Why The FireEye Breach is Big News
Earlier this week, FireEye disclosed that they had been breached. Kevin Mandia, Chief Executive officer of FireEye, wrote earlier this week in his company’s blog:
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)