These are the Cyber Regulations you need to know!
Penetration testing is a key requirement for many regulatory frameworks i.e., ISO27001, SOC 2, PCI DSS, GDPR, or OSFI. Every compliance and audit framework, standard, or procedure has its own …
Penetration testing is a key requirement for many regulatory frameworks i.e., ISO27001, SOC 2, PCI DSS, GDPR, or OSFI. Every compliance and audit framework, standard, or procedure has its own …
The world is still learning how to adjust to the “New Normal” caused by the COVID-19 pandemic, the “Great Resignation” and shifting geo-political tensions. While North American businesses have shown …
A common question we are asked is: What is the average downtime after a Ransomware attack on my business? The average length of downtime after ransomware attacks on businesses in …
What is Cyber Insurance? Cyber insurance is a specialty insurance product intended to protect businesses from Internet-based risks, and more generally from risks relating to information technology infrastructure and activities. …
Have you noticed the topic of cyber security keeps coming around the water cooler at work? Have you been ignoring the company memos because it’s using words like Phishing, Worms, …
Penetration testing is the process of identifying security gaps and issues in your IT infrastructure by emulating the tactics, techniques and procedures of a real world attacker. A penetration test, …
A Zero Day Vulnerability is an unknown flaw in either software or hardware that can be exploited by those with malicious intent. A zero day vulnerability is typically one that …
Offensive Cyber Security is a proactive measure of “ethical hacking” to determine where your digital vulnerabilities are before any real threats occur. An ethical hacker will intentionally launch a simulated …
The last two years has seen a dramatic increase in employees working from home. Early in 2020, businesses that had not yet adopted a WFH (Work From Home) strategy for …