October is Cybersecurity Awareness Month. To help support cybersecurity awareness, we’re going back to basics. A refresher of sorts, to remind you of the fundamentals, the MVP (minimally viable product) you need to ward off hackers. All too often, we’re seeing...
Let’s face it: Any industry could be subject to a cyber attack. Hackers are always on the lookout for an easy target. However, some industries are more vulnerable than others. The distinction is typically based on the potential profitability. How much data can a...
Over the last few years, cyber threats have surged and regulations have evolved, both of which have impacted the price and availability of cyber insurance. After the more recent and costly attacks, including SolarWinds and Colonial Pipeline, insurers have been...
A common complaint of vendor risk assessments is time. The time it takes a vendor to complete assessments, the time it takes the assessor to review the assessments, and the time it takes for gap analysis and remediation. Many companies quickly become fed up with the...
The old security adage, “Trust, but verify,” no longer works in this hybrid workforce world. When IT departments scrambled to get their workers moved out of the office and into their own unsecure environments in early 2020, processes for accessing corporate networks...
As the coronavirus wave recedes, another surges: cybersecurity. The new work-from-home norm has wreaked havoc on corporate IT and security teams, who are now scrambling to keep employee laptops safe and secure, and lockdown infrastructure access points. Need proof? In...