Blog
6 Best Practices for Cloud Security
The cloud has so many strategic advantages for business. Especially during the COVID-19 pandemic, the cloud model took off as employees needed to be able
Are You Prepared for a Ransomware Attack?
Ransomware is a very destructive attack when launched against businesses. There have been so many news headlines lately about ransomware that you would think most
Kaseya Breach Affects 1,000 Companies Worldwide so Far
Another supply chain ransomware attack has so far affected over 1,000 companies worldwide. Kaseya’s VSA platform was attack by the REvil ransomware gang on Friday.
5 Steps to Recover from a Ransomware Attack
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. The high-profile breaches at McDonald’s, Colonial Pipeline and JBS Meats are
5 Effective Cyber Security Controls for IoT Devices
With the COVID-19 pandemic, working from home has become the norm for many office workers. At the same time, working from home has also become
How Vulnerability Management Can Prevent Ransomware
Patching systems for vulnerabilities are key to maintaining good cyber health of your organization. Here is a recent example as discovered by Kaspersky and reported
Things you Need to Know About the Microsoft Exchange Attack
By now you may have heard that Microsoft has suffered a major breach to it Exchange Software. According to KrebsOnSecurity, At least 30,000 organizations across
Why Data Privacy is Good for Business
Tomorrow is International Data Privacy Day! If you didn’t know, International Data Privacy Day is held annually on January 28 to raise awareness and promote
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)