Blog
Costs are Higher for Firms That Don’t Have an Incident Response Plan: Study
A recent study by Cyentia Institute shows that companies that don’t have a good cyber incident response plan suffered losses 2.8 times greater than their
Do Cyber Criminals Retire?
Recently, the Maze ransomware gang has announced that they are shutting down their ransomware operation. The group said that “Maze Team Project is announcing it
Don’t Want to Pay Fines, Don’t Get Breached!
What do British Airways and Marriott Hotels have in common? Both were handed substantial fines by the UK’s Information Commissioner’s Office (ICO) over cyber security
IOT is Making Your Business Vulnerable to Cyber Attacks
2020 has been an interesting year so far. The COVID-19 pandemic has brought with it an accelerated work-from-home model that businesses are learning to adapt
Ransomware Threats Still Increasing Against Hospitals, Healthcare Sector
Do you remember, at the beginning of the COVID-19 pandemic, when hackers said they wouldn’t target healthcare organizations? Well, they lied.
What Global Privacy Laws Should You Worry About?
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
How often Should You Update Your Cyber Security Policy?
Often is the simple answer. Cyber security threat landscape is constantly changing, and policies and procedures need to be updated on a regular basis to
3 Best Practices for Secure Video Conferencing
In the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to
October is Cyber Security Awareness Month!
October is Cyber Security Awareness Month! Are you doing anything special to celebrate? What, you didn’t know cyber security awareness month was a thing?
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)