Blog
Simplify Risk Management
Risk management is a vital part of your business operations. Rather than focusing solely on vulnerability reports or remediation activities, risk management takes a more
Breached! A Cautionary Tale You Need to Re-Read
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Global Privacy Laws: What They Have Been and Where They Will go
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
The Pros and Cons of Cyber Insurance
When you think of business insurance, you think about insuring against the typical things: theft, floods, fire, etc. What about insuring your data against theft?
Can Ransomware Tamper with Critical Infrastructure?
A ransomware strain was discovered last month by security firm Dragos that actively seeks out and forcibly stops applications used in industrial control systems (ICS).
Ransomware to Continue in 2020
Ransomware is going to continue to be big news in 2020. The reason is simple: ransomware is a fast, cheap, and effective method of extracting
Yesterday was Data Privacy Day: How did you Celebrate?
Also know as Data Protection Day in Europe, Data Privacy day has been observed on January 28th since 2007. According to Wikipedia, The day is
8 Cyber Security Myths
There is a lot of misinformation out there when it comes to cyber security. Below are 8 common cyber security myths that could cost you
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)