Blog
Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?
The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their
Oh No, Not the Beer! Brewery Breach Stops Beer Production
Molson Coors disclosed on Thursday that it had suffered a breach that disrupted operations and beer production. In a filing with the U.S. Securities and
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
Signs you Need to Upgrade Your Breach Readiness Plan
Everyone knows that in today’s connected world, businesses need to have a breach readiness plan. But did you know that this plan needs to be
3 Ways to Avoid Phishing Email Scams
Phishing scams have been around for a long time. Phishing emails work often enough that there is no reason for scammers to stop. Indeed, there
Why Passwords are a big Problem
Passwords are everywhere! We need them to access workstations, mobile devices, social media and ecommerce. The trouble with passwords is that they are weak when
2 Canadian Universities hit by Cyber Attacks this Month
Both Simon Fraser University in BC and Lakehead University in Thunder Bay and Orillia were recently hit by a cyber attack this month. Students and
Is it or Is it Not Ransomware? Kia Denies Ransomware Attack
Last week, it was reported that Kia Motors America and Hyundai Motors America suffered some unexplained outages across their network. Initial reports show the outage
Why Won’t Ransomware Stop? Hint: Because you Keep Paying
Ransomware is one of the biggest challenges facing businesses today. In case you haven’t heard, ransomware is an attack where cyber criminals break into your
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)