Blog
And Another Cyber Security Firm Suffers a Breach. Is this a Trend?
Stormshield, a French cyber security firm, is the latest cyber security firm to suffer a breach. While not the first cyber security firm to be
How to Avoid Falling Victim to a Ransomware Attack, Twice
The UK’s National Cyber Security Centre (NCSC) recently published a blog post detailing how a company fell victim to the same ransomware attack twice. The
Cyber Cops Shut Down Major International Malware Syndicate: Are the Good Guys Finally Winning?
Recently, there have been two major takedowns in connection with malware criminal enterprises. European and North American cyber cops have joined forces to disrupt what
Why Data Privacy is Good for Business
Tomorrow is International Data Privacy Day! If you didn’t know, International Data Privacy Day is held annually on January 28 to raise awareness and promote
Biden Beefs up U.S. Cyber Security in Response to SolarWinds Breach
U.S. President Biden has only been president for 2 days, yet it seems he is already doing more for U.S. cyber security than his predecessor.
GDPR Fines Are Increasing: How do you Make Sure you Stay Compliant?
Navigating government regulations can always be a challenge. One thing is certain, you do not want to be caught out of compliance and have to
WhatsApp Delays Privacy Update in Response to Backlash
WhatsApp announced on Friday that it is going to postpone an update to its privacy policy in response to concerns from Security advocates. Originally, users
5 Best Practices For Good Cyber Hygiene
You may be looking at this blog title and wondering “what is cyber hygiene?” And “why do I need it?” When it comes to our
Ransomware is More About Extortion, Less About Encryption
When we think of ransomware attacks, we think usually of hackers denying an organization access to its own data until it pays a ransom. In 2020,
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)