cyberattack
-
Business Impacts of a Cyber Breach
05/05/23Cyber breaches are becoming all too common, every single day there are new reports of organizations suffering from an attack in the news....
Read blog
-
Spring Clean your Digital Clutter
04/06/23Spring is officially here and that means it is time for some good old fashioned spring cleaning! There can be many projects to...
Read blog
-
Cybersecurity Insurance Security Controls and Standards
03/27/23With the amount of ransomware attacks on the rise, the need for cybersecurity insurance has risen with it. Increased cybersecurity attacks also mean...
Read blog
-
Ransomware Victims Taking a Stand
01/24/23According to a recent article from Chainalysis, a blockchain analysis form that has worked with a number of laws enforcement and government agencies,...
Read blog
-
Exploring Cyber Insurance Coverage Options
04/14/22If your business is considering cyber insurance, you should discuss with your insurance agent what policy best fits your company’s needs; first-party coverage,...
Read blog
-
Avoid Becoming the Next Victim of a Ransomware Attack
01/06/22Ransomware attacks are more common than most people think. They occur globally every 10.2 seconds and over 55% of these attacks are aimed...
Read blog
-
Tech Support Scams Continue to Evolve Per Microsoft
07/23/21Each month, Microsoft receives about 6,500 complaints from people who have been victims of tech support scams. These numbers are only the complaints...
Read blog
-
Industry is Calling for More Pipeline Cybersecurity Regulations – Are You Ready?
06/01/21You know there’s a lack of oversight when a trade association openly calls for the federal government to issue more regulations. In response to...
Read blog
-
Ransomware Attack Shuts Down Major U.S. Pipeline
05/11/21As news spread yesterday of the ransomware attack on a major U.S. pipeline, one major news outlet described ransomware as a relatively new type of cyberattack. Um, what? Ransomware...
Read blog
-
Safely Investigate Dark Web Activity
04/30/21If your organization unfortunately becomes the victim of a cyberattack, your internal IT department may need to perform an investigation to determine the source...
Read blog