[metaslider id=2951] … Read More
Site Map
Pages:
- 2018-Endpoint Buyers Guide – Request
- Contact Us
- Contacts Page Test
- Free Security Tools
- Have a question
- Home
- How to Fortify Your Organization’s Last Layer of Security – Your Employees
- Phishing by Industry – KnowBe4
- Portal
- Privacy Statement
- Product Pricing
- Profile
- Request More Information
- Request Quote
- Request Quote for Astaro/Sophos
- Request Quote for Snare System
- Seceon – Open Threat Management
- Security Partners
- Security Solutions
- Alertlogic
- Bitdefender Business Solutions
- Blancco Drive Erasure
- Cyber Threat Hunting
- Endpoint Security Solutions
- Hexis Cyber Solutions
- Kaspersky – Endpoint Solutions for Business
- LogPoint – SIEM
- LogRhythm
- NetShield
- Network Access Control
- NXLog – Log Management Solutions
- Perimeter Security
- Request Information – Security Awareness
- Request More Information
- Security Awareness Training
- Security Information and Event Management Systems (SIEM)
- SolarWinds
- Kiwi Syslog Server
- SolarWinds Enterprise Operations Console (EOC)
- SolarWinds Log & Event Manager (LEM)
- SolarWinds NetFlow Traffic Analyzer (NTA)
- SolarWinds Network Configuration Manager
- SolarWinds Network Configuration Manager (NCM)
- SolarWinds Network Performance Monitor (NPM)
- SolarWinds Network Topology Mapper
- SolarWinds Server & Application Monitor (SAM)
- SolarWinds Virtualization Manager
- Sophos
- Sophos Cloud
- Sophos Complete Security Suite
- Sophos Encryption
- Sophos End Point Protection
- Sophos Endpoint Protection
- Sophos Mobile Control
- Sophos Network Protection
- Sophos Next Generation EndUser Protection
- Sophos Server Protection
- Sophos Webinar Series
- Ultimate IT Security Package
- Sophos Complete Security
- Sophos Security Gateways/UTM
- Management Tools
- Request Quote for Sophos Firewall
- Sophos Access Points
- Sophos iView Reporting
- Sophos Mail Security
- Sophos Network Protection Quote Request
- Sophos Network Security
- Sophos Red (Remote Ethernet Device)
- Sophos Security Gateway Appliances
- Sophos Security Subscriptions
- Sophos Smart Installer
- Sophos UTM Endpoint Protection
- Sophos UTM Software Appliances
- Sophos UTM VM Appliance
- Sophos VPN Clients
- Sophos Web Application
- Sophos Web Security
- Sophos Wireless Subscription
- Unified threat
- Thank You
- User Education – Phishing
- Services
- Sophos – Securing the Public Cloud: Seven Best Practices
- Sophos – The Impossible Puzzle of Cybersecurity
- test
- Thank you
- The 2019 What Keeps You up at Night Report
- White Paper Request – Sophos Securing the Public Cloud
- White Paper Request – Sophos The Impossible Puzzle of Cyber Security
- White Paper Request: How to Fortify Your Organization’s Last Layer of Security – Your Employees
- White Paper Request: The 2019 What Keeps You up at Night Report
- White Papers
- WhitePaper Request – KnowBe4 – Phishing by Industry
- Client Login
- Client Profile Page
Categories:
- Advanced Persistent Threat
- antivirus
- Bitdefender
- Blog
- byod
- Cloud
- compliance
- CyberThreats
- endpoint
- HealthCare
- Hexis
- industry
- Infocyte
- IoT
- Kaspersky
- KnowBe4
- Log Management
- LogRhythm
- Malware
- NetClarity
- Network Access Control
- Network Monitoring
- PCI
- Phishing
- Products
- profile
- Ransomware
- Security Awareness
- Security News
- Snare
- Snare Agents
- Snoopwall
- SolarWinds
- Sophos
- Uncategorized
- Unified Threat Management
Authors:
- admin (303)
- Cathy Burnham (12)
Monthly:
- May 2020
- June 2019
- May 2019
- April 2019
- March 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- September 2017
- August 2017
- June 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- August 2012
Recent Posts:
- Was my information part of a breach?
- Phishing and stolen credentials
- Ransomware is the Biggest Threat for Small to Medium Businesses
- ThreatList: Top 8 Threat Actors Targeting Canada in 2019
- CANADIAN POLICE RAID ‘ORCUS RAT’ AUTHOR
- Canadian Companies See Increases in Attacks, Breaches, and Sophistication in the Last 12 Months
- A Brief History of Data Breaches
- What is a Denial of Service Attack?
- Three Steps to Building an Incident Response Plan
- Viruses, Trojans, and Worms: What’s the Difference?
- Three Common Tactics Used by Social Engineers
- How to Protect Your Data While Using Public Wi-Fi
- Phishing Attacks – A Concern for Healthcare
- How to Implement a Security Awareness Program at Your Organization
- The Importance of Ransomware Protection
- Voice Phishing Scams are Getting More Clever
- Three Reasons to Hire a Cyber Security Consultant
- Tips for Choosing Strong Passwords
- Five Ways to Detect a Cyber Threat
- Three Questions to Ask When Hiring a Cyber Security Consultant
- Beware of Phishing
- Ransomware – fail to prepare, prepare to fail
- New Sleeper Strain of SamSam Ransomware Bypasses AV And Stays Hidden On Your Network
- Younger employees ‘main culprits’ for security breaches
- Almost all business report being hit with an email-borne attack, survey
- Optimizing the Security Awareness of your End-Users
- Banking Trojans replaced Ransomware as top email-based payload in Q1
- Cybercriminals are after your servers too
- A New Age of Malware – Cryptocurrency Mining
- Sophos #1 in Exploit Protection
- According to ISACA – Cyber Threats Up but no increase in Ransomware
- The Anatomy of a Hack
- KnowBe4 Adds ThinkHR Training Modules
- Phishing Attack Bypasses Two-Factor Authentication
- Ransomware Attacks Double for Second Year in a Row
- Almost One Quarter Of Canadians Have Clicked On A Phishing Link
- Organizations Are Failing To Learn From Phishing And Ransomware Attacks
- The four myths hampering cybersecurity maturity
- KnowBe4 Attains SOC 2 Type I Compliance For The Hosted Phishing And Training Product Offerings
- Cyber security awareness top priority in financial sector
- The two most important ways to defend against security threats
- Over 12,000 Business Websites Leveraged for Cybercrime
- Sophos Named Leader (again) in Gartner Magic Quadrant for Endpoint Protection
- Digital Extortion to Expand Beyond Ransomware
- AI – Could Be the Next Hole in your Security Posture
- Over a Quarter of Ransomware now targets Corporates
- IBM Discovers Cybercrime Ring Targeting Canadian Businesses
- Many businesses continue to leave their doors wide open to unsophisticated attackers, research shows
- Uber Total Loss: 57 Million Records Stolen But Data Breach Was Hidden For A Year
- KnowBe4 Releases Email Exposure Check Pro
- SyncCrypt ransomware able to sneak past most antivirus defenses
- Two Dangerous Ransomware Are Back – Protect Your Computers
- Don’t be Held Hostage by Ransomware – CFO Magazine
- SnoopWall Named one of the 10 Fastest Growing Security Companies for 2017
- Chinese ‘Fireball’ Malware Infects 20% of Global Corporate Networks
- Infocyte Uncovering a Major Hidden Risk of GDPR Legislation
- SMEs Still Too Complacent About Cyber Attack
- Today’s Phishing Attacks
- 10 Cyber Security Threats to keep you awake at night
- Cerber Ransomware Now Evades Machine Learning
- Scam of the Week: The Evil Airline Phishing Attack
- Phishing Your Employees for Schooling & Security
- Threats Evolve – Your Security Should Too
- To find the best endpoint security tools, focus on these features
- Anti-malware is imperfect but still necessary. Here’s why
- Threats Converge: IoT Meets Ransomware
- ‘Insider Sabotage’ among Top 3 Threats CISOs Can’t yet Handle
- Ransomware Is A Repeat Offender: How To Protect Your Business
- Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise
- Kaspersky: Banking malware attacks up 30.6% in 2016; finance sector phishing also more prevalent
- Stolen Health Record Databases Sell For $500,000 In The Deep Web
- Canada will soon force companies to disclose hacking attempts, data breaches
- SnoopWall NetSHIELD Nano Wins Best Network Access Control (NAC) in the Cybersecurity Excellence Awards
- ‘Shock And Awe’ Ransomware Attacks Multiply
- Canadians’ Internet Data Affected As Trump Cancels Privacy Rules
- Michigan Cybersecurity Breach Could Impact 22K Patients
- Daniel Reardon on Cybersecurity and Health Care Industry
- 12 Endpoint Solutions for Corporate Networks under Windows 10 Put to the Test
- Protecting the endpoint – Advice from Pros Not the vendors
- Overcoming the Cyber Analysis Gap
- Sophos again in the Gartner Magic Quadrant as a Leader
- BitDefender Perspectives – Outsider Attacks Give Nightmares To CIOs, CEOs, CISOs
- New Year’s Cyber Security Resolution
- Security Training 101: Stop Blaming The User
- 4 Reasons Why You Should Take Ransomware Seriously
- Major Cyberattacks on Healthcare Grew 63% in 2016
- Anti-Malware Is Necessary In The Data Center: 3 Examples
- The big cybersecurity trends that will likely continue through 2017
- The Top 8 Things to Analyze in Your Network to Detect a Compromised System
- Malware Most Common Smart Hospital Data Security Threat
- ‘Frighteningly Easy’ Hack Guesses Full Credit Card Details In 6 Seconds
- Avoid Major Data Breaches with Effective Threat Lifecycle Management
- Introducing LogRhythm 7.2
- Avalanche (crimeware-as-a-service infrastructure)
- 2017 Security Predictions
- Cerber Ransomware Delivered via Google, Tor2web
- Windows Malware Infections spiked 106% from Black Friday to Cyber Monday
- Mirai strikes again, leaving 1 million users offline
- Carleton University Latest Victim of Ransomware
- Gartner acknowledges Sophos’s continued data protection leadership