Blog
How to Keep Data Safe While Working from Home
The COVID-19 pandemic has changed the way we view office work. Roles that we once thought could only be done in the office are now
Cyber Crime Loses Exceed $4.2 Billion: FBI
The FBI has just released its Internet Crime Complaint Center (IC3) 2020 Internet Crime Report. Some of the statistics from this report may shock you.
Could The Principle of Least Privilege Have Prevented Surveillance Camera Hack?
The principle of least privilege (POLP) “is the practice of limiting access rights for users to the bare minimum permissions they need to perform their
Oh No, Not the Beer! Brewery Breach Stops Beer Production
Molson Coors disclosed on Thursday that it had suffered a breach that disrupted operations and beer production. In a filing with the U.S. Securities and
What is Your Plan if Your Data Centre Burns Down?
If you run a business, you know it is always good to have a plan. You plan for growth, and you also build contingency plans
Things you Need to Know About the Microsoft Exchange Attack
By now you may have heard that Microsoft has suffered a major breach to it Exchange Software. According to KrebsOnSecurity, At least 30,000 organizations across
6 Steps Every SMB Should Follow to Improve Their Cyber Security Posture
If you own a SMB, you may think that a cyber criminal would not be interested in stealing your assets. The reality is, SMBs are
Why Human Error is Your Biggest Cyber Security Risk
When it comes to cyber security, your business’s biggest risk factor is your own staff. Researchers from Stanford University and a top cybersecurity organization found
Signs you Need to Upgrade Your Breach Readiness Plan
Everyone knows that in today’s connected world, businesses need to have a breach readiness plan. But did you know that this plan needs to be
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)