Blog
More COVID-19 Scams to Watch For
Since COVID-19 has taken hold of the world, hackers have taken the opportunity to profit from this. In our April 10th blog, we wrote about
Best Practices for Secure Video Conferencing
In the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to
Wasaga Beach Municipal Staff Not Working Remotely to Avoid Data Breach
Since the COVID-19 pandemic, many organizations have been sending staff home and have set up remote work spaces. An article in Barrie Today talks about
Why Education is More Susceptible to Cyber Attacks During COVID-19
With schools forced to close in most jurisdictions, children are now being forced into online learning environments. Like what we have seen with remote workers,
Why Security Assessments are Still Important
With the social distancing measures imposed by COVID-19, many businesses have rush to a “work-from-home” model. While this has a great benefit to businesses that
Why Every Organization Needs to Invest in Cyber Security Now
The COVID-19 pandemic sure has turned everyday life on its head. From a business standpoint, the world has very much changed. Many businesses have either
Popular COVID-19 Cyber Attacks to Watch for and Avoid
There has been a rise in cyber attacks since the COVID-19 pandemic has shaken up the world. In addition to the recreational hackers having more
10 Tips to Better Secure Your Video Conference Tools
With the COVID-19 pandemic keeping most people at home, there has been a rise in the remote workforce. With that, video conferencing has become even
Marriott Suffers a Second Data Breach
Who says lighting doesn’t strike the same place twice? On March 31, hotel chain Marriott announced that they had suffered another data breach. The first
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)