Blog
Why you Need a Breach Plan During the COVID-19 Outbreak
Cybercriminals do not rest during a crisis. If anything, this is the perfect opportunity for them to ramp things up, as many organizations may temporarily
Staying Cybersafe During The COVID-19 Pandemic: Part 1
While many of us around the globe are worried about catching this nasty virus, hackers are finding that this is a perfect time to unleash
Shocking News: The Hackers Lied!
Recently, Bleeping Computer posted an article about how the major players behind some of the most destructive ransomware would not target health organizations during the
Ransomware Hackers Claim They Won’t Target Health Organizations During Pandemic
A story in Bleeping Computer last week claims that major hacker groups vow not to target health organizations during the Covid-19 pandemic. The story centres
How Compliance and Cyber Security Efforts can Bolster Revenue Growth
You already know that a breach can cripple your business. A breach can negatively affect your business not just in the cost of dollars spent
Tips for Remote Workers
Covid-19 is forcing more companies to look at work-at-home policies in an attempt to keep office workers safe. Just as it’s important to keep your
Coronavirus Malware Update
In our March 9th blog, we talked about how hackers were using the coronavirus to phish end users into giving up sensitive information or click
Cyber Insurance Myths and Misconceptions
As businesses grow more reliant on technology to store and process data, cyber crime is also growing. Imperva’s 2019 Cyberthreat Defense Report says 78% of
How to get the Best ROI for Your SIEM?
So, you have a purchased a SIEM (Security Information and Event Management) solution. Now that you have made the investment, the time has come to
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)