Blog
WhatsApp Delays Privacy Update in Response to Backlash
WhatsApp announced on Friday that it is going to postpone an update to its privacy policy in response to concerns from Security advocates. Originally, users
5 Best Practices For Good Cyber Hygiene
You may be looking at this blog title and wondering “what is cyber hygiene?” And “why do I need it?” When it comes to our
Ransomware is More About Extortion, Less About Encryption
When we think of ransomware attacks, we think usually of hackers denying an organization access to its own data until it pays a ransom. In 2020,
4 Types of Phishing Emails You Need to Watch Out For
There are many email scams out there to watch out for. Most of us now know that there isn’t a Nigerian prince out there wanting
Increase Your ROI With Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. Who doesn’t want an increase in ROI? There is a case
6 Things You Need to do After a Cyber Security Breach
The unthinkable has happened: your company has suffered a breach. If you are wondering how you are going to recover, here are 6 things that
COVID-19 Vaccine Scams to Watch Out For
While the year 2020 has finally come to a close, the COVID-19 pandemic has not ended with it. With the hope of the vaccines released
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)