Category : Cyber Security

Latest on Cyber Security

working from home cyber security

Working From Home: Cyber Security

In the past few weeks, we examined risks and recommendations for organizations caused by the Coronavirus as well as provided a few things to keep in mind when working from home during the COVID-19 pandemic.

Health officials are urging people to stay home and to exercise proper hygiene to stay safe and help prevent the virus spread. 

But what about cyber hygiene?

Turns out you should apply the same level of care to your supportive technology.

working from home

Coronavirus: Tips When Working From Home

With the current situation around Coronavirus, many workplaces and venues made a tough and rightful decision to temporarily close their doors (that is to promote social distancing) based on the recommendations from local and federal health authorities. That means many people are now required to work from home until COVID-19 is under control.

Last week, we shared our risks and recommendations for businesses in the light of the Coronavirus outbreak. Since many organizations elected to have most of their staff work remotely, we feel it is important to provide a few simple yet essential tips for everyone who is working from home.

60 Plants in 60 Months: ICS Cyber Security Findings & Recommendations

This is an excerpt from Genieall’s speaking session at CanWEA O&M Summit 2020.

Drive up to a facility, the gate is unlocked. Walk into the O&M building and grab a seat. So far, no one has asked your name or for your credentials.

3 cyber security tips for smbs in 2020

New Year New You: 3 Cyber Security Tips for SMBs in 2020

What 2020 will bring directly depends on you… and your perception of cyber security.

We won’t be wrong if we say that large companies with enormous budgets and innovation opportunities have always been a desirable target for cyber criminals.

At the same time, their developed security systems designed to protect against an unauthorized entry strengthen their position in the cyber space (although not 100% of time – that’s a different story).

However, the latest trend is that SMBs are at hackers’ gunpoint nowadays just as (if not more often than) large corporations.

physical security threats

Physical Security Threats (that are often overlooked)

Imagine that you’ve been tasked to secure a server storing restricted information. Some of the tools you will use might include: AI-powered endpoint protection solution, Next-Generation Firewall, network segregation, privileged accounts, MFA etc. Voila! It’s now secure.

You go home happy with a sense of accomplishment only to discover the next morning that someone walked in to the office and took out the drive with that precious data (which may trigger heavy financial losses) and walked away… Brutal!

top 12 nerc cip considerations

Top 12 NERC CIP Compliance Considerations

Please note, this is Part 1 of 2 in the series dedicated to Top 12 NERC CIP Compliance Considerations.

North American organizations that conduct business in the Energy sector are subject to strict compliance requirements of the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards.

Non-compliance may result in penalties and sanctions (i.e. failed audits and non-compliance can trigger fines and sanctions up to $1M per incident per day).

Cyber Security Epidemic in Healthcare Industry


“The health sector is in desperate need of a cyber hygiene injection” - James Scott, Senior Fellow, Institute for Critical Infrastructure Technology 

With booming development in technology and fast-paced information distribution, the healthcare industry has rapidly evolved from a paper-based to a digitally advanced sector.  

Don’t get us wrong: digitalization has helped companies to provide a comprehensive and accurate view on the client health history, faster diagnosis and treatment. 

But that’s just part of the story… 

top 5 cyber security risks for your business

Top 5 Cyber Security Risks for Your Business

The importance of cyber security is growing day by day thanks to the rapidly advancing technology.

The ongoing cyber security incidents and more importantly the impact of those are driving organizations towards recognizing cyber security component as one of the core business requirements.

1 2 3