Blog
Garmin, Canon Breaches Prove You Need a Breach Readiness Plan
If you work in cyber security, this week’s headlines will have you wondering what is going on in the world. Garmin and Canon, two very
3 Reasons the Garmin Ransomware Attack is a Big Deal
On July 27th, Garmin confirmed that it had been the victim of a cyber attack, which began on July 23rd. The attack affected Garmin’s wearables,
Why Executives Are Prone to Phishing Attacks
When in comes to finding the weak link in the security chain, you will find it in people. People are human and make mistakes. Hackers
How COVID-19 has Strengthened Cyber Security Attacks in 2020
COVID-19 has changed virtually all aspects of our lives. Our personal lives are certainly different, and our business lives have also been disrupted. COVID-19 has
Boost Your Revenue With a Compliance and Cyber Security Plan
You already know that a breach can cripple your business. A breach can negatively affect your business not just in the cost of dollars spent
Is a Vulnerability Assessment Enough?
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
The 6 Biggest Security Risks Killing Small Business!
If you are a small business owner, you may be under the mistaken impression that cyber security is only for larger enterprises. You might be
How Secure is Your Cloud Solution?
With COVID-19, many organizations rushed into cloud solutions in order to transition to work-from-home. Cloud certainly makes it easier for employees to access documents, applications,
Lessons Every Business Needs to Learn From The Twitter Hack
On July 15th, Twitter suffered its most devastating attack in its history. Several high-profile Twitter accounts were hacked to promote a cryptocurrency scam. Some of
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)