Blog
Top 5 Things to Look for in a Managed SOC service
If you are running a business, you know that you need a team who can keep your security perimeter constantly updated against new and evolving
How Vulnerability Management Can Prevent Ransomware
Patching systems for vulnerabilities are key to maintaining good cyber health of your organization. Here is a recent example as discovered by Kaspersky and reported
Why Your SMB Needs a SOC and NOC
A Security Operations Centre (SOC) and Network Operations Centre (NOC) are an important part of your business’s technology and cyber security strategy. According to Gartner,
How to Keep Data Safe While Working from Home
The COVID-19 pandemic has changed the way we view office work. Roles that we once thought could only be done in the office are now
Cyber Crime Loses Exceed $4.2 Billion: FBI
The FBI has just released its Internet Crime Complaint Center (IC3) 2020 Internet Crime Report. Some of the statistics from this report may shock you.
Things you Need to Know About the Microsoft Exchange Attack
By now you may have heard that Microsoft has suffered a major breach to it Exchange Software. According to KrebsOnSecurity, At least 30,000 organizations across
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
5 Tips to Reduce The Risk of a Cyber Attack Against Your Business
Many organizations simply don’t realize the cyber risk that is out there for their businesses. In some cases, they think they are too small to
Why the Oldsmar Water Facility breach is a Wake Up Call to Update Cyber Security Measures
It sounds like something from a spy movie. Someone tries to poison a small city’s water supply by remotely accessing the computer for the water treatment
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)