Did your Pandemic Plan Perform

Worldwide health crises like the COVID-19 global pandemic, SARS in 2003 and the avian flu of 2008 are bleak reminders of how governments, social institutions and economies can succumb to biological forces beyond human control. The breakdown in the socio-political and economic fabric of affected nations — both developed and developing — reveal how lack…

Read More
Cyber Insurance Policies

Cyber Insurance Policies Should Be Customized | Ransomware Insurance Why You Need a Cyber Insurance Policy Tailored to Your Business With the slew of cyberattacks and data breaches escalating in terms of cost and scale of damage through the years, cyber insurance has come to the forefront of discussions. While still a relative newcomer to…

Read More
covid-19 dark web

It’s no secret that large corporations and SMBs alike are struggling in the wake of the COVID-19 pandemic as social distancing measures slow global economic activity. Unfortunately, bad actors are not taking time off. In fact, the rapid shift to telework has only made company data more vulnerable, increasing the importance of comprehensive security. When times are tough, no company can afford…

Read More
Critical Data Security Program

But First, Why Data Security Needs To Be a Company Priority… Cybersecurity threats and data breaches have haunted establishments the world over since vulnerabilities accessible via the internet were revealed. Earlier tinkering with yet-to-be-discovered computer capabilities led Bob Thomas to invent the Creeper (on the ARPANET), to which Ray Tomlinson (the man who invented email)…

Read More
what is phishing

What is Phishing? On January 2, 1996, the “AOHell” cyber threat struck America Online (AOL), at that time the No.1 internet provider in the country. AOHell was the name of one of the thousands of programs created by hackers to be used for stealing passwords and credit card information by using AOL’s instant messenger and email…

Read More
Consumer Privacy Act

NEVADA’S ACT RELATING TO INTERNET PRIVACY Senate Bill 220, or “An Act relating to Internet privacy,” will require organizations who run websites that collect and maintain data to comply months ahead of 2020, by October 1, 2019 THE CALIFORNIA CONSUMER PRIVACY ACT (CCPA) A state statute intended to enhance privacy rights and consumer protection for…

Read More
Cybersecurity Auditing

Why a Focus on Cybersecurity is Critical? Cybersecurity Auditing, data breaches, and other digital era dangers show up in headlines every day.  The even more sobering reality is that most of these events never become public knowledge.  In other words, we only hear about a small percentage of the incidents. Just within the past few…

Read More
MSPs Are Priority Targets for Hackers

Managed (IT) Services Providers, or “MSP”s, have increasingly become the target of hackers especially since the beginning of 2019.  And as a result, over the last twelve months, several documented attacks have taken place, with various hacking groups gaining unauthorized access to thousands of computers and the computer networks of MSP’s clients. Once an MSP is breached,…

Read More
dark web internet security firm

The Dark Web—Dangers That Lurk and How to Avoid Them Everyone who has ever been on the internet uses the Surface Web, which is the section of the World Wide Web that’s accessible to the public and searchable using the usual search engines. However, there’s a place on the internet where users are virtually untraceable:…

Read More
Building a Vendor Management Program

Whether you want to make your internal and vendor audit programs better or need help creating them, it’s critical to engage an experienced team of professionals to help ensure you have everything in place to meet both your clients’ and your regulatory demands. Reviewing your current audit program may result in needing an upgrade—or even…

Read More