Blog
CRTC Announces Program to Protect Canadians from Scammers
The Canadian Radio and Telecommunications Commission announced on Monday that it would implement a new framework meant to combat caller ID spoofing, by September 30,
10 Tips For Detecting Phishing Emails
The thought of phishing emails is enough to panic most seasoned cyber security professionals. Afterall, they spend a lot of time and money to beef
Can you Afford a Data Breach?
A recent Forbes magazine article, “What is the Cost of a data Breach,” has reported on how much money a breach can cost your organization.
New Ransomware Attacks NAS Devices: How to Protect Your Organization From This Threat
Ransomware continues to be the big story of the year. We see over and over how companies are targeted, their data is scrambled, and then
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Give the Gift of Breached! This Holiday Season
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
New Report Says Holiday Hacking to Increase
Happy Black Friday! While some of you will trek out to the shops today, many of you will decide to stay in and shop from
Stay Cyber-Safe When Shopping Online
As the holiday season kicks off, shoppers everywhere are more and more frequently opting to use their credit cards from the comfort of their homes,
2019 Reports of Ransomware are Outpacing 2018
According to a Chubb Insurance report, there have already been more instances of ransomware than in all of 2018. The report, titled, “Adapting to the
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)