top of page
Search

3 min read
Unwanted Guests: The Importance of Cybersecurity for Hotels & Operators in the Hospitality Sector
In today's interconnected digital landscape, cybersecurity is not just a concern for financial institutions and tech companies. The...

3 min read
The MSP Dilemma
To be adequately protected from cyber-attacks, it is essential to know the delineation of services between a Managed [IT] Services...

3 min read
Three Questions to Ask Your MSP About Cybersecurity
Most small-to-midsize businesses and organizations utilize a local MSP for network and hardware support. The MSP's expertise is focused on I

1 min read
How Cyber Smart Are You - Batch 1
Do you know how to stay cyber safe? How well can you answer the first 25 cyber questions in our cybersecurity quiz? Don't worry, we won't...


2 min read
Cybersecurity for SMBs an Untapped Market with Billion-dollar Potential, Integrated Cyber CEO Says
Integrated Cyber offers a suite of internet security solutions

2 min read
$214 BILLION in Cybersecurity Spending Projected for 2024
Several key factors are driving the global increase in cybersecurity spending. Firstly, adopting cloud computing has increased investment...


3 min read
MGM Ransomware - Big Losses at the Tables, thanks to human error
I keep telling you about human error and cyber risk. Well, once again, we had a high-profile hack and ransomware event last week. The...


2 min read
Johnson Controls ransomed for $51 Million to get 27 Terabytes of data back
Building automation giant Johnson Controls hit by ransomware attack Johnson Controls International, a multinational conglomerate...


2 min read
Top 10 Cybersecurity Issues Facing The Manufacturing Industry
Cybersecurity is a critical concern for businesses in the manufacturing sector, including metals, machining, tools & fabrication companies.


4 min read
Penetration Testing vs. Vulnerability Scans
In today's digital landscape, where cyber threats are becoming increasingly sophisticated, you must prioritize the security of your...


1 min read
Why Should I do a Vulnerability Assessment?
Vulnerability assessments might not be the flashiest part of your cybersecurity strategy. Still, they're like the foundation that holds...

1 min read
Top Routinely Exploited Vulnerabilities of 2022Â
CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 The U.S. Cybersecurity...

2 min read
Ransomware Hits the Hospital for Sick Children in Toronto
The Hospital for Sick Children in Toronto says most of its priority systems are back after a ransomware attack affected its operations....

1 min read
Cybercrime costs Canadian companies billions of dollars each year
The average cost of a cyber incident for small businesses is $250,000. A new report from the Information and Privacy Commissioner of...


2 min read
Reduce your risk of a cyber breach by 45%... or more.
Organizations that conduct regular cyber vulnerability assessments are 45% less likely to experience a data breach than those that do not.


3 min read
US Government Cybersecurity Priorities for FY2025
Administration Releases Cybersecurity Priorities for FY 2025 Budget The Biden administration has released a memorandum outlining its...


4 min read
The CIO Cyber Dilemma
CIOs have once again been tasked with the expectation of solving the cyber threat for our companies. We're sharing 12 Steps to help.


3 min read
Credit Ratings Now Impacted By Cybersecurity Response
Credit-rating agencies are placing more emphasis on companies' responses to cyberattacks as a factor in their creditworthiness. S&P...

2 min read
Vulnerability Assessment Guide - Maximizing Your Cybersecurity
Running regular vulnerability assessments is crucial for maximizing your cybersecurity defenses.

1 min read
The Cost of a Data Breach
The Cost of a Data Breach Report from IBM offers IT, risk management and security leaders a lens into factors that can increase or help...
Blog
bottom of page