top of page
Search

The Human Behavior Side of Cyber Breaches: Understanding the Role of People in Cybersecurity
In today's interconnected world, cyber breaches have become a significant threat to organizations, governments, and individuals alike....
5 min read

Unwanted Guests: The Importance of Cybersecurity for Hotels & Operators in the Hospitality Sector
In today's interconnected digital landscape, cybersecurity is not just a concern for financial institutions and tech companies. The...
3 min read

The MSP Dilemma
To be adequately protected from cyber-attacks, it is essential to know the delineation of services between a Managed [IT] Services...
3 min read

Three Questions to Ask Your MSP About Cybersecurity
Most small-to-midsize businesses and organizations utilize a local MSP for network and hardware support. The MSP's expertise is focused on I
3 min read

How Cyber Smart Are You - Batch 1
Do you know how to stay cyber safe? How well can you answer the first 25 cyber questions in our cybersecurity quiz? Don't worry, we won't...
1 min read


Cybersecurity for SMBs an Untapped Market with Billion-dollar Potential, Integrated Cyber CEO Says
Integrated Cyber offers a suite of internet security solutions
2 min read

$214 BILLION in Cybersecurity Spending Projected for 2024
Several key factors are driving the global increase in cybersecurity spending. Firstly, adopting cloud computing has increased investment...
2 min read


MGM Ransomware - Big Losses at the Tables, thanks to human error
I keep telling you about human error and cyber risk. Well, once again, we had a high-profile hack and ransomware event last week. The...
3 min read


Johnson Controls ransomed for $51 Million to get 27 Terabytes of data back
Building automation giant Johnson Controls hit by ransomware attack Johnson Controls International, a multinational conglomerate...
2 min read


Top 10 Cybersecurity Issues Facing The Manufacturing Industry
Cybersecurity is a critical concern for businesses in the manufacturing sector, including metals, machining, tools & fabrication companies.
2 min read


Penetration Testing vs. Vulnerability Scans
In today's digital landscape, where cyber threats are becoming increasingly sophisticated, you must prioritize the security of your...
4 min read


Why Should I do a Vulnerability Assessment?
Vulnerability assessments might not be the flashiest part of your cybersecurity strategy. Still, they're like the foundation that holds...
1 min read

Top Routinely Exploited Vulnerabilities of 2022
CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 The U.S. Cybersecurity...
1 min read

Ransomware Hits the Hospital for Sick Children in Toronto
The Hospital for Sick Children in Toronto says most of its priority systems are back after a ransomware attack affected its operations....
2 min read

Cybercrime costs Canadian companies billions of dollars each year
The average cost of a cyber incident for small businesses is $250,000. A new report from the Information and Privacy Commissioner of...
1 min read


Reduce your risk of a cyber breach by 45%... or more.
Organizations that conduct regular cyber vulnerability assessments are 45% less likely to experience a data breach than those that do not.
2 min read


US Government Cybersecurity Priorities for FY2025
Administration Releases Cybersecurity Priorities for FY 2025 Budget The Biden administration has released a memorandum outlining its...
3 min read


The CIO Cyber Dilemma
CIOs have once again been tasked with the expectation of solving the cyber threat for our companies. We're sharing 12 Steps to help.
4 min read


Credit Ratings Now Impacted By Cybersecurity Response
Credit-rating agencies are placing more emphasis on companies' responses to cyberattacks as a factor in their creditworthiness. S&P...
3 min read

Vulnerability Assessment Guide - Maximizing Your Cybersecurity
Running regular vulnerability assessments is crucial for maximizing your cybersecurity defenses.
2 min read
Blog
bottom of page