Blog
The Benefits of Integrating Your Managed IT and Cyber Security Services
Managed IT Service provides you with the People, Processes and Technologies to proactively monitor and manage all aspects of your critical systems infrastructure. What happens
Do you Need Cloud Security for AWS?
Did you know that cloud security is a Shared Responsibility between the customer and AWS? In the AWS world, that means customers are responsible for
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
The Cost of Cyber Crime Per Minute
Ever think about what the cost of cyber crime is per minute? RiskIQ has, and their info sheet on the costs are frightening. Dubbed “The
Backups Save the Day for Most Kaseya VSA Breach Victims
A story in BleepingComputer states that victims of the REvil ransomware attack on Kaseya VSA are refusing to pay the ransom. The reasons: Backups! A
Top 3 Cyber Security Challenges Facing SMBs
If you are running a SMB (Small and Medium-sized Business), you know that there are many challenges to facing your business. One of those challenges
Kaseya Breach Affects 1,000 Companies Worldwide so Far
Another supply chain ransomware attack has so far affected over 1,000 companies worldwide. Kaseya’s VSA platform was attack by the REvil ransomware gang on Friday.
Can Bad Cyber Security Hygiene Get Your Business In Trouble with the SEC? Yes!
The U.S. Securities and Exchange Commission (SEC) has recently fined First American Financial Corporation (FAFC) $487,616 for deficient disclosure controls and procedures related to cybersecurity
How Cloud Misconfigurations Can Lead to Customer Data Exposure
Just yesterday, ThreatPost reported that more than 1 billion records for CVS health customers were left exposed in a database of a third party vendor.
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)