Blog
Marriott Suffers a Second Data Breach
Who says lighting doesn’t strike the same place twice? On March 31, hotel chain Marriott announced that they had suffered another data breach. The first
Why you Need a Breach Plan During the COVID-19 Outbreak
Cybercriminals do not rest during a crisis. If anything, this is the perfect opportunity for them to ramp things up, as many organizations may temporarily
Staying Cybersafe During The COVID-19 Pandemic: Part 2
While many of us around the globe are worried about catching this nasty virus, hackers are finding that this is a perfect time to unleash
How to get the Best ROI for Your SIEM?
So, you have a purchased a SIEM (Security Information and Event Management) solution. Now that you have made the investment, the time has come to
Why Vulnerability Assessments Are Not Enough
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
Simplify Risk Management
Risk management is a vital part of your business operations. Rather than focusing solely on vulnerability reports or remediation activities, risk management takes a more
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Cyber Security New Year’s Resolutions
2020 is here! As we approach the end of the first full week back on the job this year, here are some thoughts for resolutions
The ROI on Managed GRC
That’s a lot of acronyms in one title, but hopefully I’ve got your attention. There is a case for a great Return on Investment (ROI)
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)