Blog
Scammers use Coronavirus Fears to Phish Companies
Hackers around the world are using fears about coronavirus to spread malware. Researchers at Check Point Software Technologies Inc. have recently observed a noticeable number
Money Returned After Being Stolen in a Phishing Scam
A few days ago, we reported about the real-life spear phishing scam that cost Barbara Corcoran $388,700. On March 2nd, People Magazine and Pymnts revealed
Simon Fraser University Latest Canadian Organization to be hit by Ransomware
On March 2nd, Simon Fraser University (SFU) disclosed on their website that they identified a data breach occurred on February 28th. The school said that
What a Real-Life Spear Phishing Campaign Looks Like
Most people would like to believe when it comes to a phishing attack, that they won’t be fooled. After all, an email that comes in
How to Protect Yourself From SIM Swapping
SIM swapping occurs when an attacker calls a mobile provider and tricks the telco into changing a victim’s phone number to an attacker-controlled SIM card.
Why Vulnerability Assessments Are Not Enough
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
Basic Cyber Security Steps
Prioritizing cyber security can seem like a daunting task. If you break the task down into several manageable steps, it becomes much easier to implement.
MGM Hotels Guests Have Their Personal Data Exposed on Hacking Website
According to a post by ZDNet, 10.6 million MGM Resorts hotels guests have had their personal details published to a hacking website this week. ZDNet
Why Cyber Security Needs to be Built-in to Every Business Process
Cyber attacks are growing every year. There are all kinds of stats out there to verify this: 78% of organizations worldwide were hacked in 2019.
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)