Blog
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
What is MGRC and Why You Need it?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Cost Effective Tips for Improving Your Business’s Cyber Security
Cyber Security is necessary for today’s connected businesses. One thing that is a challenge, particularly for smaller businesses, is the lack of financial resources to
Can you Afford a Data Breach?
A recent Forbes magazine article, “What is the Cost of a data Breach,” has reported on how much money a breach can cost your organization.
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Give the Gift of Breached! This Holiday Season
In 2015 Dave Millier released his first novel, Breached! A Cautionary Tale of Cybersecurity and Intrigue. If you haven’t heard of it, Breached! is the
What is MGRC and Why You Need it?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
Why Is It Important to Automate Compliance Activities?
Compliance is an essential part of any company’s information security strategies. It governs businesses’ best practices and ensures that they keep their customers’ information safe.
There’s No Such Thing as a Small Breach
Lately it seems data breaches are becoming more commonplace. Hardly a week goes by without the media reporting about a nation’s government or another business
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)