Blog
How COVID-19 has Strengthened Cyber Security Attacks in 2020
COVID-19 has changed virtually all aspects of our lives. Our personal lives are certainly different, and our business lives have also been disrupted. COVID-19 has
Is a Vulnerability Assessment Enough?
You work hard to ensure your business is compliant with various security standards and legislation governing your security measures. Often, that means performing vulnerability assessments—sometimes
Cyber Security Challenges Affecting Businesses
If you own a business, you know that staying ahead of cyber threats is important. Below are just some of the biggest cyber security challenges
Why There is No Such Thing as a Small Breach
Data breaches are becoming more frequent. Hardly a week goes by without the media reporting about a nation’s government or another business suffering major data
Do You Know Why Cyber Security Awareness Training Fails?
It’s clear that staff can be the weak point in the cyber security chain. Providing the right type of cyber security awareness program can mean
Should You Worry About the Security of Your Healthcare Records?
Absolutely, you should. Especially is you can’t answer this question: do you know exactly how your personal health information is being protected by health providers,
Why you Need a Breach Plan During COVID-19
Cybercriminals do not rest during a crisis. If anything, this is the perfect opportunity for them to ramp things up, as many organizations may temporarily
Why SMBs are at Risk of a Cyber Attack During COVID-19
Small and Medium sized businesses (SMBs) are not immune to cyber attacks. In fact, they are a prime target for hackers because they know SMBs
Why is a Remote COVID-19 Vulnerability Assessment Essential?
According to Wikipedia, a vulnerability assessment “is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.” With regards to IT
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)