CALL US 1800-399-2000

Uzado's Blog

The Latest Cybersecurity News and Advice... All Available Here!


Everything You Need to Know About NIST CSF

By Alix Postan October 16, 2017

You might have heard of the National Institute of Standards and Technology’s Cyber Security..

What is Incident Management?

By Alix Postan October 13, 2017

Incident Management (IM) software is arguably one of the most important cybersecurity tools that..

The Yahoo Data Breach:  What happened?

By Alix Postan October 11, 2017

You’ve probably heard by now that Yahoo’s data breach in 2013 wasn’t contained to include only 1..

6 Best Practices For IT Service Management

By David Millier October 9, 2017

IT service management is an important feature of today’s IT departments. No matter which ITSM..

How to Set a Secure Login

By Alix Postan October 6, 2017

A secure login will benefit you in three major ways: (1) secure authentication prevents any other..

When Crime does pay: Cybercrime is cheaper and more accessible than ever!

By Maria Catricala October 4, 2017

Maybe you have heard of SaaS (Software as a Service), as an easy way to deliver software..

How to Rethink Your Compliance Approach

By David Millier October 2, 2017

After Whole Foods, Equifax, Deloitte and so many other companies were hacked, it's important to go..

Whole Foods ≠ Whole Security

By Alix Postan September 29, 2017

On September 28, Whole Foods announced that their restaurants had experienced a hack. Lately,..

The Ultimate Guide to Security Frameworks and Governance Models

By Alix Postan September 25, 2017

There are various frameworks that IT departments can institute to mitigate incidents and reduce..

Beware of this New Malware that Can Infect Your System with TWO Types of Ransomware

By Maria Catricala September 21, 2017

Yet another global ransomware is sweeping across several countries, and it’s more severe than the..

If it weren’t for our users…

By Maria Catricala September 20, 2017

When you ask the people about computer security, most would probably say that hackers and viruses..

My Antivirus software is distributing malware?  Who knew???

By Alix Postan September 18, 2017

CCleaner (aka, Crap Cleaner) is an anti-virus software that has over 2 billion downloads and over..

Airports are now incorporating Biometrics into Check-in Counters

By Alix Postan September 15, 2017

Biometrics are often used as a form of authentication. Previously, airports would manually..

The Equifax Hack

By Alix Postan September 13, 2017

There have been many stories released about the Equifax hack since the news broke. The story is..

FAQ’s about Compliance

By Alix Postan September 11, 2017

What does ‘compliance’ mean in terms of cybersecurity?

Much like the commonly-known definition,..

How to Protect Your Business From Ransomware Attacks

By Maria Catricala September 8, 2017

A quick glance of the recent news shows an alarming trend of malware and ransomware attacks on..

Did You Accidentally Download a DDoS on Your Android?

By Alix Postan September 6, 2017

Google reportedly deleted over 300 apps from the Google Play Store, for being DDoS attacks. So..

7 Tips for Dealing with Internet Security Threats

By David Millier September 4, 2017

Can you honestly say that you believe your system is safe from security threats? Probably not. It’s..

What Your Organization Needs to Know about IT Security

By David Millier September 1, 2017

Even though many organizations are increasingly concerned about security in an increasingly..

Move Over Nokia… The NYPD is Switching to iPhones

By Alix Postan August 30, 2017

When the NYPD (New York Police Department) announce that they are changing cell phone providers,..

Top 4 Cyber Attacks Your Business is Likely to Face and What to do About Them

By Maria Catricala August 28, 2017

Does thinking about cybersecurity keep you awake at night?  Does it seem like an overwhelming task..

Say Hello to the New Girl in Town… Amazon Macie

By Alix Postan August 25, 2017

Amazon Macie is the new artificial intelligence software that Amazon has introduced to Amazon Web..

Would You Still Use Uber After Hearing This?

By Alix Postan August 22, 2017

Uber recently agreed to 20 years of audits, as a settlement over a data breach. Would you continue..

What is the Difference between ITSM and ITIL?

By David Millier August 21, 2017

The information technology world loves acronyms, and at first glance, many of the terms that get..

Biometrics: To Use or Not to Use?!

By Alix Postan August 18, 2017

According to a Scalar Security Study Report, 81% of respondents admit that cyberattacks are..

Docs.com is facing early retirement

By Alix Postan August 16, 2017

Docs.com is an information sharing Microsoft platform, that houses documents for anyone to see...

The Many Benefits of Operations & Compliance Management Software

By David Millier August 14, 2017

Whether you’re the CEO or part of the IT team, you know how important it is to keep your operations..

HBO’s Game of Thrones Has Been Hacked!

By Alix Postan August 11, 2017

On July 31st, HBO confirmed that they had experienced a breach that compromised some of its..

Who Needs a Risk-Based Approach to Vulnerability Remediation?

By David Millier August 9, 2017

The answer is everyone? Anyone and everyone doing business in the modern business environment.

Many..

Is Data Safe in the Cloud?

By Alix Postan August 7, 2017

When you save something to the cloud, do you give it a second thought? Or do you just forget about..

White House Officials Duped by Phishing Attack

By Maria Catricala August 4, 2017

It’s been recently reported that several White House Officials were tricked into responding, and..

GDPR Snapshot

By Alix Postan August 2, 2017

Canadian businesses: it’s time to prepare for GDPR. Why? In May 2018, the EU will mandate that ALL..

Is Cash Becoming Worthless? Or is Cashless Becoming Priceless?

By Alix Postan July 28, 2017

July 2017 marks the month where debit card transactions have inevitably surpassed cash payments,..

There’s an (HIPAA Compliant) App for That

By Alix Postan July 26, 2017

HIPAA compliance remains to be the most difficult compliance standard to follow, with the highest..

Ashley Madison Pays Up

By Alix Postan July 21, 2017

 

The infamous infidelity website has finally settled on a deal of $11.2 million. Ashley Madison..

The Hulk of Encryption Machines

By Alix Postan July 19, 2017

The ‘Hulk’ of encryption machines is finally here! The IBM Z Mainframe can encrypt approximately..

You Need a Risk-Based Approach to Vulnerability Remediation

By David Millier July 14, 2017

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

What Millennials Need to Know About Cybersecurity

By Alix Postan July 12, 2017

#1 – It’s “Cybersecurity” not “cyber security”. Just like cyberattack, cybercafé, cyberbullying,..

6 Signs You Should Invest in Compliance Software

By Alix Postan July 10, 2017

1. Your organization must comply to multiple standardsDepending on your product/service offering,..

Why Do I Need a Managed Services Provider?

By Maria Catricala July 7, 2017

Before we can answer the question as to need, we need to know what a managed service provider..

5 Steps to Basic Vulnerability and Remediation Management

By Alix Postan July 5, 2017

Vulnerability and Remediation Management can easily become overwhelming when you see such an..

Becoming PCI Compliant

By David Millier July 3, 2017

If your organization is in the business of accepting credit card payments, you know you need to be..

Your computer could be in danger of another ransomware attack

By Alix Postan June 30, 2017

This specific ransomware is called: Petrwrap.

Ransomware is a malicious software that either..

Five Best Security Blogs You Should be Reading

By Maria Catricala June 28, 2017

Sometimes it can seem daunting trying to find useful Security Information on the Internet.  There..

Why a Risk-Based Approach to Remediation is Important

By David Millier June 26, 2017

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

The Difference Between Anti-virus’ vs Firewalls

By Alix Postan June 23, 2017

If you can take anything away from this post, it’s to implement both tools!

It’s a common..

Four Measures Your Organization Needs to Achieve HIPAA Compliance

By David Millier June 21, 2017

With revisions to federal legislation around the security and storage of health information in the..

Cybersecurity and Health Care Don’t Mix… Said No One…

By Alix Postan June 19, 2017

1% of Health Care Organizations say they are not vulnerable to cyber-attacks.

The truth is,..

Can Smartphones get hacked?

By Alix Postan June 16, 2017

Simply put – yes. But… there are ways to protect against it.

**If this has happened to you, and..

Secure Payment Terminals gain ‘Lift off’ with Lufthansa

By Alix Postan June 14, 2017

If you’ve ever been to an airport (any airport in the world), the first thing you’ll notice are,..

Compliance Does Not Equal security

By David Millier June 12, 2017

It’s a serious mistake—and one that too many people make all too often: assuming that your..

Could Brexit lead to a Major Security Breach for the UK and the EU?

By Alix Postan June 9, 2017
Prior to Brexit, Britain and the EU had collectively gathered security information for..

5 Myths About Network Security

By Maria Catricala June 7, 2017

Myth # 1: Network security is too complex for us to use. Reality: It doesn’t have to be. Using..

How Your Business Can Benefit from ITSM Software

By David Millier June 5, 2017

IT service management (ITSM) offers businesses a significant advantage over traditional IT. But..

Canadian Businesses with Ties to China, May be in Trouble

By Alix Postan June 2, 2017

China, the world’s second largest economy, is planning on publishing new cybersecurity laws, to be..

Don’t Make ‘Password’ your password

By Alix Postan May 31, 2017

Passwords... Now required for everything, but how do you make them memorable?

Password Don’ts:

  • ..

Simplifying IT in 6 Steps

By David Millier May 29, 2017

Today's business environment requires sophisticated technology departments fulfilling numerous..

The Worst Advice We've Ever Heard About Compliance

By Alix Postan May 26, 2017

Ask anyone in the industry, and they’ll tell you they’ve heard some really bad advice when it..

10 Signs You Should Invest in Security

By Alix Postan May 24, 2017
  1. You get a lot of emails As important as emails are, they are also the primary way for malware to..

7 Things About Information Security Your Boss Wants to Know

By David Millier May 22, 2017
  1. Email is NOT Secure

Email is not as private as people sometimes think it should be.  Left..

Trump Administration’s Cyber Security Strategy

By Alix Postan May 19, 2017

On May 11th, President Trump finally signed an executive order for cybersecurity protocols. This..

3 Ways to Improve Remediation Management

By David Millier May 17, 2017

It doesn’t matter how big or small your company is, you will never be completely safe from..

Around the World with WannaCry

By Alix Postan May 15, 2017

Ransomware viruses have been on the rise since 2005, with the most recent virus called WannaCry –..

Top 5 Reasons Your Business Needs ITSM Software

By David Millier May 12, 2017

If you’ve implemented ITSM processes or you’re thinking about doing so, it goes without saying..

What is HIPAA Compliance?

By David Millier May 10, 2017

With revisions to federal legislation around the security and storage of health information in the..

Why Vulnerability Assessments Are Insufficient

By David Millier May 8, 2017

You know you need to be compliant with all the standards and legislation affecting your industry,..

What Businesses Need to Know about IT Security

By David Millier May 5, 2017

Even though many businesses are increasingly concerned about security in an increasingly insecure..

Why Compliance Does Not Mean Security

By David Millier May 3, 2017

Many people assume that being compliant will ensure that their business is secure. It’s an easy..

Top 4 Ways to Better Manage Vulnerabilities

By David Millier May 1, 2017

Business executives have been told over and over again just how important managing vulnerabilities..

How to Make Effective Use of IT Time and Stabilize Security Costs

By David Millier April 28, 2017

There's truth to the old saying that time is money, and to prove it, most businesses need look no..

How to Be PCI Compliant

By David Millier April 26, 2017

If your organization is in the business of accepting credit card payments, you know you need to be..

Software as a Service

By David Millier April 24, 2017

As the world of technology evolves, so does the world of business. Computers revolutionized the..

How Workflow Management Can Save Time and Simplify Processes

By David Millier April 21, 2017

In today’s tough business environment, organizations have to stay sharp and seek out advantages..

The Five Benefits of Operations & Compliance Management Software (OCM)

By David Millier April 19, 2017

Most CEOs and It staff know how important it is to keep your operations compliant with new..

Don’t Get Fired Over Compliance Issues: Read This!

By David Millier April 17, 2017

Compliance issues create tricky situations for employees. While most rules and regulations are easy..

6 Ways to Implement IT Service Management

By David Millier April 14, 2017

IT service management is an important feature of today’s IT departments. No matter which ITSM..

Common Misconceptions About Compliance and How to Rethink Your Approach

By David Millier April 12, 2017

 

Being compliant is an important first step for businesses looking to ramp up their security..

A Risk-Based Approach to Vulnerability Remediation: Why Your Organization Should Follow This Best Practice

By David Millier April 10, 2017

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

What is OFSI?

By David Millier April 7, 2017

What is OFSI?  Chances are you’ve heard the acronym “OSFI” tossed around if you work in the..

How to Improve ROI and IT Efficiency

By David Millier April 3, 2017

Can ITSM Improve IT Efficiency and ROI?

Even as more and more businesses make the switch to IT..

How to Improve IT Service Management

By David Millier March 31, 2017

You’ve been using IT service management (ITSM) in your organization for a little bit, or perhaps..

What You Need to Know about IT Service Management

By David Millier March 29, 2017

You’ve heard a bit about IT service management (ITSM), and maybe now you’re thinking about..

Introduction to IT Service Management

By David Millier March 24, 2017

Perhaps you’ve heard about IT service management (ITSM). Maybe you’re just learning about the..

How Can You Achieve NERC CIP Compliance?

By David Millier March 20, 2017

The North American Electric Reliability Corporation (NERC)has been the electric reliability..

4 Things You Need to Know about Cybersecurity

By David Millier February 24, 2017

Cybersecurity is an important subject for just about any business today. As computer technology has..

5 Benefits of IT Service Management

By David Millier February 22, 2017

As IT functions have become more firmly embedded in the day-to-day operations of almost every..

How to Simplify Risk Management

By David Millier February 20, 2017

Risk management is a vital part of your business operations. Rather than focusing solely on..

How to Systematize a Reliable Approach to Managing Compliance

By David Millier February 17, 2017

You know that governing risk and compliance (GRC), no matter how large the task, is incredibly..

Save Your Business Time by Automating Compliance Activities

By David Millier February 15, 2017

Compliance management is incredibly important to your company’s operations, and it can constitute a..

Why We Need IT Service Management

By David Millier February 13, 2017

IT service management (ITSM) is the prevailing paradigm in delivering IT service in many businesses..

The Effective Tool for Managing Governance, Risk, and Compliance

By David Millier February 10, 2017

Managing governance, risk, and compliance (GRC) is no small task, no matter the size of your..

How to Simplify Compliance Management

By David Millier February 8, 2017

Compliance management is one of those tasks that can take an inordinate amount of time. In fact,..

Consider a Cloud-Based Platform to Manage Compliance

By David Millier February 6, 2017

You know all of the advantages of using a compliance management platform to help you keep on top of..

How Cyber Security Works

By David Millier January 30, 2017

Cyber security is one of the most important issues facing modern companies. It’s virtually..

3 Reasons Remediation Management Is So Important

By David Millier January 27, 2017

You can’t put a price on your data. Everything from your intellectual property to your customers’..

HIPAA Compliance Healthcare Survey Results

By Jeremy Alderman January 26, 2017

NueMD, who is a cloud-based medical billing service, administered a HIPAA compliance survey in..

IT Service Management for Beginners

By David Millier January 25, 2017

“Expect the best, prepare for the worst.” This idiom applies to many things. After all, it’s..

3 Ways to Improve Your Remediation Management

By David Millier January 23, 2017

No matter how big or small your company is, you will never be completely safe from cybersecurity..

5 Little-Known Facts about IT Security

By David Millier January 20, 2017

IT security is far from simple, but your employees need to prioritize it if they want to remain..

Data Security: What You Need to Know about Remediation Management

By David Millier January 18, 2017

How do you protect your network? Do you keep up with basic compliance measures? Do you scan..

How IT Service Management Can Improve Company Productivity

By David Millier January 16, 2017

Anyone who has turned on a TV in the last 20 years has probably seen a portrayal of an IT worker...

How to Implement IT Service Management

By David Millier January 13, 2017

Your employees mean well. They want to go home at night knowing that they did their best and..

What Is IT Service Management Software?

By David Millier January 11, 2017

IT workers are among the most important and least recognized employees in your company. Very few..

How Has Cyber Security Changed?

By David Millier January 9, 2017

Nothing stays the same for very long, but the internet has made these changes happen even faster...

How Cyber Security Can Be Improved

By David Millier January 6, 2017

Is cyber security a priority at your company? If it isn’t, your system may be at greater risk. In..

How to Manage Vulnerabilities Efficiently

By David Millier January 4, 2017

Your network is made up of thousands upon thousands of assets. Many of these components are..

5 Critical Steps Towards NERC CIP Compliance

By David Millier December 30, 2016

When people think about cybersecurity threats, they rarely consider them to be life threatening...

5 Must-Know Ways to Ensure IT Security

By David Millier December 28, 2016

Total IT security isn’t a goal that you can ever achieve. Technology changes at a rapid pace...

Why Is Vulnerability Remediation Important?

By David Millier December 26, 2016

How safe is your business? Do your information security protocols really go far enough to protect..

Why You Should Automate Compliance Activities

By David Millier December 23, 2016

You can’t rely on compliance alone to keep your system safe from threats, but it’s certainly a..

Everything You Need to Know about Vulnerability Management

By David Millier December 21, 2016

Risk is an inherent part of life. Every moment that you spend moving, eating, or breathing carries..

4 Things to Know about NERC CIP Compliance

By David Millier December 19, 2016

Cyberattacks don’t just affect individuals or massive corporations. They can also have a chilling..

7 Tips for Dealing with Internet Security Threats

By David Millier December 16, 2016

Can you honestly say that you believe your system is safe from security threats? Probably not. It’s..

What’s Involved in Automating Compliance Activities?

By David Millier December 14, 2016

It’s never easy to ensure that your system is compliant with relevant policies and regulations. The..

Why It’s Crucial to Prioritize Remediation Management

By David Millier December 12, 2016

People are often at their most vulnerable when they think they’re safe. If you’re not expecting an..

How Preventative Measures Will Help You Manage Vulnerabilities

By David Millier December 9, 2016

Companies can’t afford to be ignorant about their IT security. One data breach can erase all of..

Vulnerability Management: 5 Risky Behaviours to Avoid

By David Millier December 7, 2016

There’s an inherent risk to nearly every aspect of modern business. When employees begin a process,..

Why Is It Important to Automate Compliance Activities?

By David Millier December 5, 2016

Compliance is an essential part of any company’s information security strategies. It governs..

IoT Security: What You Should Know about the DDoS Attacks

By David Millier December 2, 2016

Nobody ever wants to face a denial of service (DoS) attack, but the recent assault on DNS provider..

Massive Cybersecurity Attack Attributed to Mirai Botnet

By David Millier November 30, 2016

Throughout the day on October 21, 2016, many internet users found their normal routines..

What Mirai Botnet Malware Means for IoT Security

By David Millier November 28, 2016

The Mirai botnet malware isn’t the first attempt at compromising Internet of Things (IoT) devices,..

3 Common Misconceptions about Cyber Security

By David Millier November 25, 2016

Cyber security is an increasingly prevalent issue that many companies face on a daily basis. ..

Everything You Need to Know about NERC CIP Compliance

By David Millier November 23, 2016

Within the industry of cybersecurity,there is a non-profit organization that ensures the..

How Organizations Can Ensure Better IT Security

By David Millier November 21, 2016

With statistics showing 230,000 cyber hacking activities a day, there is a great need for companies..

4 Simple Ways to Ensure Better IT Security

By David Millier November 18, 2016

It has been said that, in this day and age, it simply isn’t possible to stop every attack on your..

4 Tips for Prioritizing Vulnerability Remediation

By David Millier November 16, 2016

Vulnerability remediation is one of those tasks that many firms would like to ignore...

What Is Remediation Management and Why Is It Important?

By David Millier November 14, 2016

No doubt you’ve heard the term remediation management before. Maybe your IT security team is using..

What Organizations Need to Know about Cybersecurity

By David Millier November 11, 2016

You know that security is both an enormous task and a vital function for any organization. You know..

How Your Business Should Handle Security Threats

By David Millier November 9, 2016

It’s an unfortunate reality: There will be a point in time when a business comes under threat from..

The Essential Guide to Ensuring IT Security

By David Millier November 7, 2016

You know that IT security is essential for any firm trying to compete in the business world today...

4 Things You Didn’t Know about Cybersecurity

By David Millier November 2, 2016

At first glance, cybersecurity might seem like it’s easy or even straightforward. Most..

4 Ways to Prioritize Vulnerability Remediation

By David Millier October 31, 2016

You want to keep your organization safe. In an increasingly insecure world, it’s a major concern..

What Your Organization Needs to Know about IT Security

By David Millier October 28, 2016

Even though many organizations are increasingly concerned about security in an increasingly..

5 Reasons Your Business Needs ITSM Software

By David Millier October 24, 2016

If you’ve implemented ITSM processes or you’re thinking about doing so, it goes without saying that..

6 Tips for Tech Analysts to Improve Efficiency

By David Millier October 21, 2016

The tech analysts working in the IT departments of many businesses don’t have an easy go of things...

5 Talks You Won’t Want to Miss at SecTor 2016

By Uzado October 17, 2016

SecTor 2016 is quickly approaching! From October 17 to 19, Toronto will host a number of top..

5 Things We’re Looking Forward to at SecTor 2016

By Uzado October 16, 2016

SecTor 2016 is quickly approaching! From October 17 to 19, Toronto will host a number of top..

Don’t Miss It! Dave Millier Is Speaking at SecTor 2016

By Uzado October 15, 2016

The 2016 edition of SecTor, Canada’s largest information security expo, is quickly approaching. As..

Why You Should Prioritize Compliance Management

By David Millier October 14, 2016

You know that compliance isn’t the be-all, end-all of security for your business—and nor should it..

Attending SecTor 2016? Check Out Dave Millier’s Talk

By Uzado October 13, 2016

In just a few days’ time, information security professionals and experts from around the world will..

A Simple Introduction to ITSM

By David Millier October 12, 2016

For those who are new to the field, IT service management can appear quite intimidating at first..

4 Ways to Better Manage Vulnerabilities

By David Millier October 10, 2016

If you’re in business, you’ve been told over and over again just how important managing..

A Beginner’s Guide to ITSM Processes

By David Millier October 7, 2016

IT service management has been improving IT departments in many firms for years now. Whether your..

Why You Need to Prioritize Vulnerability Remediation

By David Millier October 5, 2016

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

4 Ways to Step Up Your Data Security Practices

By Rebecca Hosley October 4, 2016

While many business owners believe they're taking steps to protect their data, the statistics often..

How to Improve Your Remediation Management

By David Millier October 3, 2016

You already know how important it is to manage your remediation effectively, and perhaps you’ve..

4 Advantages of Vulnerability Management

By David Millier September 30, 2016

Maybe you've just heard about vulnerability management, or maybe your company has been using it for..

5 Ways to Simplify Your IT Management

By David Millier September 28, 2016

Businesses today operate in an environment that requires sophisticated technology departments. As..

ITSM vs. ITIL: What's the Difference?

By David Millier September 26, 2016

At first glance, ITSM and ITIL might seem to be synonymous, even interchangeable, terms, especially..

What Is Remediation Management?

By David Millier September 21, 2016

You've done a vulnerability scan recently, and now that you're aware of the threats to your systems..

Why Vulnerability Assessments Are Not Enough

By David Millier September 19, 2016

You work hard to ensure your business is compliant with various security standards and legislation..

The Biggest Misconception about Compliance

By David Millier September 16, 2016

There are plenty of misconceptions about compliance. For example, many people make the mistake of..

6 Reasons ITSM Is a Great Tool

By David Millier September 14, 2016

Anyone already using IT service management knows it’s a great tool that has plenty of advantages..

Why You Should Prioritize Ongoing Security Instead of Compliance

By David Millier September 12, 2016

Compliance is the starting point to becoming secure for many companies. But while making your..

Why Compliance Does NOT Equal Security

By David Millier September 9, 2016

Being compliant is an important part of security for any business. Codes, legislation, and various..

Why You Should Rethink Your Approach to Compliance

By David Millier September 7, 2016

Being compliant is an important first step for businesses looking to ramp up their security..

4 Compliance Mistakes You’re Probably Making

By David Millier September 5, 2016

Everyone makes mistakes from time to time; it’s human nature. But in business, those mistakes can..

The Ultimate Guide to Effective Vulnerability Management

By David Millier September 2, 2016

Implementing vulnerability management is a huge undertaking for most businesses. Ensuring that your..

Being Compliant Does Not Mean Your Business Is Secure

By David Millier August 31, 2016

It’s a serious mistake—and one that too many people make all too often: assuming that your business..

Why Equating Compliance with Security Is Problematic

By David Millier August 29, 2016

Many people assume that being compliant will ensure that their business is secure. It’s an easy..

How Do I Become HIPAA Compliant?

By David Millier August 26, 2016

With revisions to federal legislation around the security and storage of health information in the..

How to Make More Effective Use of IT Time and Stabilize Security Costs

By David Millier August 24, 2016

There's truth to the old saying that time is money, and to prove it, most businesses need look no..

How to Simplify Your IT Management

By David Millier August 22, 2016

Today's business environment requires sophisticated technology departments fulfilling a number of..

What Does a SaaS Provider Do?

By David Millier August 17, 2016

Cloud computing has given rise to the software as a service (SaaS) model. Under SaaS, a business no..

How IT Service Management Can Increase ROI and Improve Efficiency

By David Millier August 15, 2016

It’s not a myth: IT service management (ITSM) really can increase your organization’s ROI and..

What’s the Difference between ITSM and ITIL?

By David Millier August 8, 2016

The information technology world loves acronyms, and at first glance, many of the terms that get..

What Is Vulnerability Remediation?

By David Millier August 5, 2016

Today’s businesses put a lot of emphasis on the security of their data and systems. Those that..

Why Vulnerability Assessments Aren’t Sufficient

By David Millier August 3, 2016

You know you need to be compliant with all the standards and legislation affecting your industry,..

Why You Need a Risk-Based Approach to Vulnerability Remediation

By David Millier August 1, 2016

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

What Is OSFI?

By David Millier July 29, 2016

If your organization deals in the financial sector in Canada, chances are you’ve heard the acronym..

Can ITSM Improve IT Efficiency and ROI?

By David Millier July 27, 2016

Even as more and more businesses make the switch to IT service management, some people remain leery..

What You Need to Do to Be PCI Compliant

By David Millier July 25, 2016

If your organization is in the business of accepting credit card payments, you know you need to be..

6 IT Service Management Best Practices

By David Millier July 22, 2016

IT service management is an important feature of today’s IT departments. No matter which ITSM..

How Tech Analysts Can Save Time and Simplify Processes

By David Millier July 20, 2016

In today’s tough business environment, organizations have to stay sharp and seek out advantages..

5 Advantages of Using ITSM Software

By David Millier July 18, 2016

You know that using IT service management has been a huge advantage for your business, but have you..

What Is Basel II Compliance?

By David Millier July 15, 2016

Basel II, the second of the Basel Accords, came into effect in the early 2000s, and was set to be..

Everything You Need to Know about PCI Compliance

By David Millier July 13, 2016

Identity theft has been on the rise, aided by the use of wireless technologies and the internet. If..

What Is ITIL?

By David Millier July 11, 2016

The Information Technology Infrastructure Library (ITIL) is a set of best practices for IT service..

What Is HIPAA Compliance?

By David Millier July 8, 2016

If your company deals with protected health information (PHI), you’re familiar with the Health..

What Is ITSM Software and How Can Your Business Benefit?

By David Millier July 6, 2016

IT service management (ITSM) offers businesses a significant advantage over traditional IT. But..

How to Avoid Getting Fired over Compliance

By David Millier July 4, 2016

Compliance issues create tricky situations for employees. While most rules and regulations are easy..

The Many Benefits of Operations & Compliance Management Software (OCM)

By David Millier July 1, 2016

Whether you’re the CEO or part of the IT team, you know how important it is to keep your operations..

What Is IT Service Management?

By David Millier June 29, 2016

The way IT departments function has evolved rapidly in the last 20 years and by now, you probably..

What Is Software as a Service?

By David Millier June 27, 2016

As the world of technology evolves, so too must the world of business. Computers revolutionized the..

Introduction to ITSM

By David Millier July 15, 2015

"Traditional" can be a good thing. Wearing your lucky silk tie that helped you nail your first..

Search

Subscribe to Email Updates