Blog
Experts Say Testing Backups is Key to Preventing Ransomware Payments
Ransomware continues to be a big problem globally for both large enterprises and small businesses. In the news we hear of big ransomware demands that
5 Steps to Recover from a Ransomware Attack
Ransomware is a huge problem for big and small businesses alike. We’ve seen ransomware that has forced small businesses to close. The high-profile breaches at McDonald’s, Colonial Pipeline and JBS Meats are
Why a Breach Readiness Plan is so Important
Having a proactive plan to respond to a cyber security breach just makes sense. Reacting to a breach can set your organization back in more
What Happens When Ransomware Affects a Major Gas Pipeline?
A ransomware attack shut down a major gas pipeline in the U.S. Colonial Pipeline, which carries almost half of the gasoline, diesel and other fuels
8 Steps to Building a Strong Breach Readiness Plan
You know that reacting to a breach can set your organization back in more ways than just the financial impact. By implementing a proactive approach
Top 5 Cloud Cyber Security Threats
Moving to the cloud has so many strategic advantages for business. The key advantages, especially during the COVID-19 pandemic, is that employees can work remotely
Why Boards Need to Take Cyber Security Seriously
Do executive boards of companies take cyber security seriously enough? According to the UK’s new CEO of the National Cyber Security Centre (NCSC), Lindy Cameron,
Signs you Need to Upgrade Your Breach Readiness Plan
Everyone knows that in today’s connected world, businesses need to have a breach readiness plan. But did you know that this plan needs to be
Why the Oldsmar Water Facility breach is a Wake Up Call to Update Cyber Security Measures
It sounds like something from a spy movie. Someone tries to poison a small city’s water supply by remotely accessing the computer for the water treatment
Categories
- Cloud (22)
- Compliance (72)
- Compliance Management (56)
- Cyber awareness (46)
- Cybersecurity (270)
- Encryption (27)
- GDPR (25)
- HIPAA Compliance (23)
- Incident Management (20)
- Insurance (4)
- IT Service Management (41)
- ITIL (1)
- ITSM Software (1)
- Operations & Compliance Management Software (26)
- Phishing (111)
- PIPEDA (8)
- Ransomeware (2)
- Ransomware (119)
- Remediating Risks (135)
- SaaS (23)
- Sector (2)
- Security (263)
- Software as a Service (42)
- Software as Service (2)
- Spam (14)
- Ticketing (2)
- Uncategorized (3)
- Viruses (63)
- Vulnerability management (82)
- Workflow (8)