Blog
Microsoft Warns of New Phishing Attack Targeting Office 365 Users
Microsoft is warning users of a new type of phishing attack that involves a call centre to help you download malware. Using a call centre
Why Cyber Awareness Training Should be Tailored to Employee Function
We often hear about cyber attacks that target certain types of employees, whether it be by function or location. So, does it not make sense
How Fast Can a Leaked Password be Exploited by Hackers?
It’s an all too familiar story. Company X get’s breached and you receive an email telling you that your password may have been stolen and
Is DMARC the Answer to the Phishing Problem?
Phishing is a global problem plaguing many businesses. The statistics on phishing alone are scary. These three in particular should scare you: 65% of U.S.
4 Types of Phishing Emails You Need to Watch Out For
There are many email scams out there to watch out for. Most of us now know that there isn’t a Nigerian prince out there wanting
Increase Your ROI With Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. Who doesn’t want an increase in ROI? There is a case
COVID-19 Vaccine Scams to Watch Out For
While the year 2020 has finally come to a close, the COVID-19 pandemic has not ended with it. With the hope of the vaccines released
Business Email Compromise Strikes Food Bank
Business Email Compromise is a type of cyber attack where cyber criminals use email to try and steal data or money. This type of attack
Do Cyber Criminals Retire?
Recently, the Maze ransomware gang has announced that they are shutting down their ransomware operation. The group said that “Maze Team Project is announcing it
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)