Blog
Don’t Want to Pay Fines, Don’t Get Breached!
What do British Airways and Marriott Hotels have in common? Both were handed substantial fines by the UK’s Information Commissioner’s Office (ICO) over cyber security
IOT is Making Your Business Vulnerable to Cyber Attacks
2020 has been an interesting year so far. The COVID-19 pandemic has brought with it an accelerated work-from-home model that businesses are learning to adapt
Ransomware Threats Still Increasing Against Hospitals, Healthcare Sector
Do you remember, at the beginning of the COVID-19 pandemic, when hackers said they wouldn’t target healthcare organizations? Well, they lied.
What Global Privacy Laws Should You Worry About?
People are growing more and more concerned over the use of their personal data by companies online. And they should be. Breaches of personal data
Why You Need MGRC?
MGRC is an acronym for Managed Governance, Risk Management and Compliance. As a business owner or executive, you know you are responsible for GRC initiatives.
How often Should You Update Your Cyber Security Policy?
Often is the simple answer. Cyber security threat landscape is constantly changing, and policies and procedures need to be updated on a regular basis to
3 Best Practices for Secure Video Conferencing
In the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to
October is Cyber Security Awareness Month!
October is Cyber Security Awareness Month! Are you doing anything special to celebrate? What, you didn’t know cyber security awareness month was a thing?
3 Reasons Remediation Management Is So Important
Your business’ data is priceless. Think about it: everything from your intellectual property to your customers’ payment information is valuable. This inevitably means that someone
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)