Cyber Security Insurance

In our previous newsletter we discussed how cybersecurity controls and baselines that were once considered optional by some organizations are now considered the bare minimum. One of the contributing factors to this new reality is the increasingly strict requirements...

Understanding Security Controls

When the average person thinks about cybersecurity, they are likely to think about elements such as hackers cracking passwords, installing viruses or malware, and locking down systems. The reality is that modern threats have rapidly developed in recent years and now...

Understanding Social Engineering

Today’s cybercriminals are targeting identities, making use of phishing, vishing, and social engineering techniques. Gone are the days of easy-to-spot and low-effort phishing emails. Successful attacks now involve sophisticated methods that include impersonation of a...

Best Practices Around Security

Modern security tools have significantly reduced organizational risk by deploying a variety of safeguards against traditional cyber threats. However, as these defenses have become more sophisticated, cybercriminalshave adapted their strategies. The rise of widely...

Cloud Migration Allows Swift Recovery Following Damaging Flood

The Challenge A client’s location suffered a disastrous flood that damaged both the physical workspace as well as countless operating devices, including computers and networking equipment. The office had to be closed for weeks to allow restoration services to be...

Cyber Insurance Requirement and MFA

As businesses become fully digital and staff access corporate resources from around the world, the importance of strong security tools and policies becomes more critical. This connectivity has led to growing threats from cyber attacks, and as a result, many...
Skip to content