Blog
Why you Need a Breach Plan During COVID-19
Cybercriminals do not rest during a crisis. If anything, this is the perfect opportunity for them to ramp things up, as many organizations may temporarily
Why SMBs are at Risk of a Cyber Attack During COVID-19
Small and Medium sized businesses (SMBs) are not immune to cyber attacks. In fact, they are a prime target for hackers because they know SMBs
Top 5 Security Measures Being Missed During COVID-19
With COVID-19 being top of mind, some cyber security best practices may have fallen by the wayside. Here are 5 security measures that may have
Incidents of COVID-19 Ransomware Increase in Canada
The pandemic that is COVID-19 is quickly turning into pandemic of ransomware. Canada is not immune to the global increase in ransomware.
How to Flatten the Curve on COVID-19 Cyber Security Risk
Non-essential businesses in most parts of the world have shut down to flatten the curve on COVID-19 cases. Many office workers are now working from
Survey Says Cyberattacks are on the Rise due to COVID-19
In mid-April, ISACA surveyed more than 3,700 IT audit, risk, governance and cybersecurity professionals from 123 countries to assess the impact of COVID-19 on their
Why is a Remote COVID-19 Vulnerability Assessment Essential?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
Why Phishing Awareness is Important for Executives Too
When in comes to finding the weak link in the security chain, you will find it in people. People are human and make mistakes. Hackers
Ecommerce Opportunities and Risks During COVID-19
If there is one area of the economy growing out of the COVID-19 pandemic, it is of Ecommerce. In a press release issued by ACI
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)