Being liable for the loss of sensitive cyber information.

Posts

Cyber liability insurance for SMBs

Hidden Gaps in Cyber Liability Insurance for SMBs: Why a Policy Isn’t Enough

,
The commercial insurance landscape is often slow to change, relying on decades of data to predict future losses. Cyber insurance, however, does not have that luxury. It is a sector in its relative infancy, sprinting to keep pace with a threat…
Cybersecurity as a value driver

Cybersecurity as a Value Driver for Business Leaders

,
The Business Problem Cyber incidents aren’t just IT issues—they’re balance-sheet events. Outages, legal spend, missed SLAs, and customer churn compound quickly. Treating cybersecurity as a value driver reframes spend as margin protection…
Workplace Setup

Risk of a Common Password and Ways to Avoid it (Infographic Inside)

Using a common password leaves your organization at risk for cybercriminals to attack your account. Let’s add password protection as a major component in your organization's cybersecurity plan.  The risk of a common password is tremendous,…

Cybercriminals Are Targeting HR Depts. With This Resume Scheme

, ,
Trojan malware attacks are resurfacing since businesses are starting to return to work embracing a new normal in a post-COVID-19 world. Organizations have started to resume their hiring practices by posting job opportunities on their website,…
Cyber Attack Prevention

Cognizant Gets $400 Million Payout After Cyber Attacks

, , ,
Technology consultant firm Cognizant fell victim to cyber-attacks caused by a ransomware attack last April. The hack disrupted thousands of employees from accessing networks from their home during quarantine. Clients also disallowed Cognizant…
Buying Cyber Insurance

Buying Cyber Insurance Does Not Protect Your Organization From Cybercriminals

,
Buying Cyber Insurance Does Not Protect Your Organization From Hackers   Understand that purchasing Cyber Insurance does not protect your organization from hacking. It simply finances pieces of the loss. A recent report by cybersecurity…
Macbook with codePhoto by Christopher Gower on Unsplash

Conducting An Organization Wide Phishing Test

,
Remote operation of your business means that protections your office building had, your employees' homes may not. Cybercriminals are taking advantage of this situation by phishing out your employees' data. Take the time to educate your employees…
Computer screen with code

Disturbing Hacking Trends

, , , ,
Security experts commonly say that there are only two types of companies these days. There's companies that have been hacked, and those that don't yet know that they've been hacked. Here are some important hacking trends given by a statistical…
colorful codePhoto by Ilya Pavlov on Unsplash

Business Interruption and Ransomware

, , , ,
Ransomware is a type of malware designed to deny access to a person’s computer unless they pay the hacker ransom. The NY Times reports that these attacks have grown over the past year with a 41 percent increase in 2019. Ransomware attacks…