Blog
Why Cyber Awareness Training Should be Tailored to Employee Function
We often hear about cyber attacks that target certain types of employees, whether it be by function or location. So, does it not make sense
How Cloud Misconfigurations Can Lead to Customer Data Exposure
Just yesterday, ThreatPost reported that more than 1 billion records for CVS health customers were left exposed in a database of a third party vendor.
Why Paying a Ransomware Demand Doesn’t Guarantee a Swift Return to Business
There have been a lot of high-profile breaches in the news lately. McDonald’s, Colonial Pipeline and JBS Meats are just three examples of some big
How Fast Can a Leaked Password be Exploited by Hackers?
It’s an all too familiar story. Company X get’s breached and you receive an email telling you that your password may have been stolen and
What You Need to Know About the Cloud Shared Responsibility Model
The cloud has so many strategic advantages for business. The key advantages, especially during the COVID-19 pandemic, is that employees can work remotely from anywhere,
What is “RockYou2021” and Should you be Worried?
You may have seen something in the news recently about “RockYou2021” and have been wondering “what is that?” Simply put, RockYou2021 is a 100GB TXT
Should you Handle Cyber Security Risk on Your Own?
Most business owners, especially of SMBs, know that it takes the wearing of many hats to grow a successful business. When it comes to cyber
Is Your Organization Prepared for Cyber Threats Upon a Return to the Office?
It doesn’t seem that long ago we were all warned about the cyber risks associated with a mostly remote workforce. Now it seems there is
Could the Global Food Supply Chain be Affected by a Cyber Attack?
Just weeks after the operator of the biggest US oil pipeline was paralyzed by a cyberattack, one of the world’s largest meat processors, JBS Foods,
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)