Blog
Will a Ban on Ransomware Payments Make Ransomware Go Away?
New York, North Carolina, Texas, and Pennsylvania are considering a ban on businesses making ransomware payments after some high-profile attacks against Colonial Pipeline and JBS
5 Steps to Recover from a Ransomware Attack
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. The high-profile breaches at McDonald’s, Colonial Pipeline and JBS Meats are
How Cloud Misconfigurations Can Lead to Customer Data Exposure
Just yesterday, ThreatPost reported that more than 1 billion records for CVS health customers were left exposed in a database of a third party vendor.
Should you Handle Cyber Security Risk on Your Own?
Most business owners, especially of SMBs, know that it takes the wearing of many hats to grow a successful business. When it comes to cyber
Why a Breach Readiness Plan is so Important
Having a proactive plan to respond to a cyber security breach just makes sense. Reacting to a breach can set your organization back in more
Is There a Ransomware Crisis? Experts Weigh in on How to Respond
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. It was also blamed
5 Effective Cyber Security Controls for IoT Devices
With the COVID-19 pandemic, working from home has become the norm for many office workers. At the same time, working from home has also become
5 Steps to Performing Better Vulnerability Assessments
Performing a vulnerability scan once a year just to meet a compliance requirement isn’t enough to secure your network. To improve your security posture and
Top 5 Cloud Cyber Security Threats
Moving to the cloud has so many strategic advantages for business. The key advantages, especially during the COVID-19 pandemic, is that employees can work remotely
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)