Data breach losses are growing by double digits, with the average cost per breach now exceeding $4 million! Many companies are looking for ways to better prepare and protect themselves from those kinds of losses. Endpoint Detection and Response (EDR), Managed...
The trouble with passwords, and how to correct it While passwords have been an invaluable tool for over half a century, they are not without their drawbacks: if a password is discovered by a third party, there is nothing to stop them from authenticating as that user....
There are many misconceptions about cyber security. Here are a few common examples, as well as how to better prepare for and avoid them. Myth #1: Cyber hackers only target large businesses Reality: If you’re a small and medium-sized business, you may think your data...
What is Network Segmentation? Network Segmentation is a configuration in which network and computer systems inside of a corporate network are divided into logical segments. These segments typically group devices with similar purposes together for a number of...
How do you keep your digital life secure from hackers and scammers? Doing the basics goes a long way in protecting your personal data and safeguarding your accounts from thieves. Hackers and social engineers prey on the weak and building up a little bit of cyber...
Check your Cybersecurity Stance: Mitigate your Risk and Rising Insurance Costs We’ve received a growing amount of inquiries from prospects and clients related to this question: “Is there anything you can do to help lower our cybersecurity Insurance premiums?” During...