Blog
What You Need to Know About Spoofing
If your business is not addressing spoofing in its cyber awareness program, it should be. What is spoofing? According to the Government of Canada Get
Why You Need a Remote COVID-19 Vulnerability Assessment?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
The Ongoing Growth of Hacking Attempts on Government
In a recent interview with CBC News, the head of Canada’s cyber security agency warned that attacks launched by online criminals against the Canadian government
What Canada’s New Digital Privacy Act Could Mean For Businesses
Yesterday, Innovation Minister Navdeep Bains introduced the Digital Charter Implementation Act. The new act, officially called an “Act to enact the Consumer Privacy Protection Act
How Quickly Could Your Business Recovery From a Cyber Attack?
Imagine the unthinkable happened and your business suffered a cyber attack. How long to do think it would take you to recover from it?
5 Cyber Security Myths That Could Destroy Your Business
Many business leaders tend to ignore cyber security when it comes to their business plans. They ignore it in many cases because of these widespread
Costs are Higher for Firms That Don’t Have an Incident Response Plan: Study
A recent study by Cyentia Institute shows that companies that don’t have a good cyber incident response plan suffered losses 2.8 times greater than their
Do Cyber Criminals Retire?
Recently, the Maze ransomware gang has announced that they are shutting down their ransomware operation. The group said that “Maze Team Project is announcing it
6 Reasons You Need to Invest in Compliance Managment
1. Your organization must comply to multiple standardsDepending on your product/service offering, your organization may have to comply with multiple standards. For example, a healthcare
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)