Blog
Why Your SMB Needs a SOC and NOC
A Security Operations Centre (SOC) and Network Operations Centre (NOC) are an important part of your business’s technology and cyber security strategy. According to Gartner,
How to Ensure Cyber Security Compliance Doesn’t Drive Away Sales
How often has this happened to you. You run a SMB and are about to close a really big busines deal. There is just one
Why Law Firms Need A Managed Security Services Partner
You don’t need to be a cyber security expert to know that there is an increase in cyber attacks against law firms. Last year’s high
Should Water Treatment Facilities Allow Remote Access?
Should water treatment staff be allowed to remote login to monitor systems? This is becoming a hot button issue with the Oldsmar breach in February
7 Ways to Secure Staff Working From Home
Working from home just might be here to stay. A Gartner study from April 2020 says that 74% of employers would like to make 5%
Why Boards Need to Take Cyber Security Seriously
Do executive boards of companies take cyber security seriously enough? According to the UK’s new CEO of the National Cyber Security Centre (NCSC), Lindy Cameron,
Study Says Manufacturing Firms are Learning Cyber Security the Hard Way
When it comes to cyber attacks, we know that the healthcare sector and government agencies are some of the top targets. But what about the
Is it Time to Stop Relying on SMS for Multifactor Authentication?
Multifactor authentication is a way of authenticating to a device or software with a password plus another factor, usually one-time code or biometrics. The easy
Is DMARC the Answer to the Phishing Problem?
Phishing is a global problem plaguing many businesses. The statistics on phishing alone are scary. These three in particular should scare you: 65% of U.S.
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)