Cybersecurity Awareness for ExecutivesIn an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will... BLOG Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is...
Cybersecurity Awareness for ExecutivesIn an organizational setup, executives sit at the top of the access level hierarchy. Most likely, your company’s executives will...
BLOG Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack... Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many... FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... €2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to... Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at... Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian... The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure.... Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is...
Business Impact Analysis (BIA) September 11, 2020 Modern-day enterprises thrive on making data-oriented decisions to further their business objectives. Such organizations seek to implement a business continuity...
Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
Access Rights Review September 4, 2020 Access rights are the permissions granted to a user or application for accessing a file, modifying configurations/settings, or adding or...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Dangerous Internet’s Cat Meow September 1, 2020 The ‘Meow’ is one of the first publicly known cyberattacks to steal and wipe out insecure data. This attack...
Benefits of end-to-end encryption & client-side encryption August 31, 2020 End-to-end and client-side encryption are controversial topics for legitimate reasons. While it makes digital forensics more difficult, it also brings many...
FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
€2.9 Million Issued in Fines in Q2 2020 Under GDPR August 27, 2020 The COVID-19 pandemic brought on many problems for organizations from all industries across the world. Organizations that were able to...
Advantages of Cyber Incident Retainers August 25, 2020 Being on constant alert for cyber threats to your organization is a must. A cyber-attack can strike your organization at...
Canadian Government’s GCKey Service Targeted by Cyberattacks and Used to Steal COVID-19 Relief Benefits August 25, 2020 Recently, the Canadian government services were targeted by cyberattacks used to steal COVID-19 relief payments. The attacks breached the Canadian...
The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
The Types of Two-Step Verification August 21, 2020 Two-step verification is an important feature for keeping accounts safe. However, not all types of two-step verification are equally secure....
Human Resources and Cybersecurity August 21, 2020 The Human Resource (HR) team alongside the cybersecurity team can help make your organization. The role of Human Resources is...