Blog
Best Practices for Secure Video Conferencing
In the wake of COVID-19, many organizations were forced into a work-from-home model. Video conferencing solutions became the glue to help keep organizations connected to
Wasaga Beach Municipal Staff Not Working Remotely to Avoid Data Breach
Since the COVID-19 pandemic, many organizations have been sending staff home and have set up remote work spaces. An article in Barrie Today talks about
Why Security Assessments are Still Important
With the social distancing measures imposed by COVID-19, many businesses have rush to a “work-from-home” model. While this has a great benefit to businesses that
Popular COVID-19 Cyber Attacks to Watch for and Avoid
There has been a rise in cyber attacks since the COVID-19 pandemic has shaken up the world. In addition to the recreational hackers having more
Marriott Suffers a Second Data Breach
Who says lighting doesn’t strike the same place twice? On March 31, hotel chain Marriott announced that they had suffered another data breach. The first
Why you Need a Breach Plan During the COVID-19 Outbreak
Cybercriminals do not rest during a crisis. If anything, this is the perfect opportunity for them to ramp things up, as many organizations may temporarily
Shocking News: The Hackers Lied!
Recently, Bleeping Computer posted an article about how the major players behind some of the most destructive ransomware would not target health organizations during the
Coronavirus Malware Update
In our March 9th blog, we talked about how hackers were using the coronavirus to phish end users into giving up sensitive information or click
Cyber Insurance Myths and Misconceptions
As businesses grow more reliant on technology to store and process data, cyber crime is also growing. Imperva’s 2019 Cyberthreat Defense Report says 78% of
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)