Blog
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
Are You Prepared for a Ransomware Attack?
Ransomware is a very destructive attack when launched against businesses. There have been so many news headlines lately about ransomware that you would think most
Backups Save the Day for Most Kaseya VSA Breach Victims
A story in BleepingComputer states that victims of the REvil ransomware attack on Kaseya VSA are refusing to pay the ransom. The reasons: Backups! A
Top 3 Cyber Security Challenges Facing SMBs
If you are running a SMB (Small and Medium-sized Business), you know that there are many challenges to facing your business. One of those challenges
Will a Ban on Ransomware Payments Make Ransomware Go Away?
New York, North Carolina, Texas, and Pennsylvania are considering a ban on businesses making ransomware payments after some high-profile attacks against Colonial Pipeline and JBS
5 Steps to Recover from a Ransomware Attack
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. The high-profile breaches at McDonald’s, Colonial Pipeline and JBS Meats are
Why Paying a Ransomware Demand Doesn’t Guarantee a Swift Return to Business
There have been a lot of high-profile breaches in the news lately. McDonald’s, Colonial Pipeline and JBS Meats are just three examples of some big
Was AXA Breached Because They Would no Longer Support Ransomware Payments?
One of the world’s biggest cyber insurance companies, AXA, suffered a ransomware attack at its offices in Asia this weekend by noted ransomware gang Avaddon.
Is There a Ransomware Crisis? Experts Weigh in on How to Respond
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. It was also blamed
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)