Protect Against Phishing

July 10, 2019

Phishing is a common method hackers use to attack computer systems. Successful phishing attacks pose a serious threat to the security of electronic records and personal information. Ontario’s privacy laws require public and healthcare organizations to have reasonable measures in place to protect personal information in their custody or control.

Spotlight

Virtual Forge Inc

Virtual Forge is a leading supplier of Security, Compliance and Quality assurance products and services that help our customers secure and manage their SAP® systems and applications. We help our customers identify and mitigate risk efficiently providing protection against cyber-attack while enhancing the performance and quality of their SAP landscape. Our customers are worldwide leading companies acting in branches such as automotive, aerospace and defense, banking and insurance, chemicals and pharmaceuticals, high-tech and electronics, media and entertainment, consumer goods, trade, oil and gas, and utilities.

OTHER WHITEPAPERS
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

Sharkgate Whitepaper

whitePaper | December 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a new approach that will change website security as the industry knows it and make the next-generation of cyber protection available to all websites worldwide.

Read More
news image

2022 Cyber Security Report

whitePaper | July 25, 2022

The past twelve months represents one of the most turbulent and disruptive periods on record, at least as far as security is concerned. As governments and businesses around the world continued to navigate the uncharted waters of a global pandemic, the so-called “new normal” still felt a long way off. Digital transformation efforts were dramatically accelerated as businesses embraced hybrid and remote working arrangements, but the same questions around security maturity that plagued many businesses in 2020 persisted through 2021.

Read More
news image

Avoiding the Security Pitfalls of Digital Transformation

whitePaper | April 1, 2020

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits of cloud technologies including efficiency, agility and scalability while avoiding the pitfalls.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More

Spotlight

Virtual Forge Inc

Virtual Forge is a leading supplier of Security, Compliance and Quality assurance products and services that help our customers secure and manage their SAP® systems and applications. We help our customers identify and mitigate risk efficiently providing protection against cyber-attack while enhancing the performance and quality of their SAP landscape. Our customers are worldwide leading companies acting in branches such as automotive, aerospace and defense, banking and insurance, chemicals and pharmaceuticals, high-tech and electronics, media and entertainment, consumer goods, trade, oil and gas, and utilities.

Events