Friday, September 27, 2024
Contingent Business Interruption Insurance for Cyber Events - In today’s evolving risk landscape, organizations of all sizes and sectors face a wide range of cyberthreats. Amid advancing attack techniques and growing...
Tuesday, August 27, 2024
The Role of a Public Relations Specialist in Cyber Incident Response - When cyber incidents strike, organizations need to respond swiftly and effectively to limit related losses. As such, it’s crucial for organizations...
Tuesday, August 27, 2024
The Role of Digital Forensics and Incident Response in Cybersecurity - As the cybersecurity landscape evolves and cybercriminals continue to develop new ways to infiltrate computer systems and networks, employers must...
Tuesday, August 27, 2024
SIM-Swapping Attacks Explained - In recent years, a growing number of organizations have implemented stronger cybersecurity measures, including multifactor authentication (MFA). This method requires a user to present...
Thursday, July 25, 2024
The Role of a Data Breach Coach in Cyber Incident Response - Cybersecurity events can lead to businesses sustaining substantial financial and reputational damage. Recovering from these incidents can also be complicated...
Friday, May 24, 2024
Cybersecurity Awareness Programs: Benefits and Implementation - Businesses of all sizes are susceptible to cyberattacks such as phishing scams, malware attacks and ransomware schemes, which can create significant...
Wednesday, April 24, 2024
Cloud Security Management Explained - Cloud computing refers to a pay-per-use service that equips users with on-demand access to a range of IT resources (e.g., databases, software, servers, networking and analytics...
Monday, April 8, 2024
- Data Breach Class Actions Skyrocketed in 2023 - Data breach class action lawsuits “exploded” in 2023, according to Duane Morris LLP’s Class Action Review 2024, becoming one of the fastest growing areas of litigation...
Friday, November 17, 2023
MGM Cyberattack Emphasizes Need for Layered Digital Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned back in...
Tuesday, October 10, 2023
MGM Cyberattack Emphasizes Need for Layered Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned this week,...
Monday, September 25, 2023
- - SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures - On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) published final rules to enhance and standardize how companies disclose...
Thursday, August 24, 2023
- Average Data Breach Cost Hits All-time High of $4.4M - According to IBM’s annual Data Breach report, the average cost of a data breach reached an all-time global high of $4.45 million, up 2.3% from 2022 and 15.3%...
Tuesday, August 15, 2023
- The Value of Cyber Insurance - As cyberattacks become more frequent and costly, it’s crucial for organizations to maximize their financial protection against related losses by purchasing sufficient insurance. Cyber...
Tuesday, May 2, 2023
When a data breach or other cyber event occurs, the damages can be significant, often resulting in lawsuits, and serious financial losses. What’s more, cyber exposures impact businesses of all kinds, regardless of their...
Wednesday, March 22, 2023
Mobile malware-malicious software designed to gain access to private data on mobile devices-is a growing threat to companies’ cybersecurity. As companies embrace remote work and more employees use their personal devices...
Tuesday, February 7, 2023
Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach valuable business data. In fact, 94% of...
Friday, January 20, 2023
Cyber incidents-including data breaches, ransomware attacks and social engineering scams-have become increasingly prevalent, impacting organizations of all sizes and industries. Such incidents have largely been brought...
Friday, October 7, 2022
Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and other kinds of malware. It...
Tuesday, September 27, 2022
As cyber attacks become more and more common, protecting your data is increasingly difficult. In fact, a study from Juniper Research found that by 2023, cyber criminals are expected to steal an estimated 33 billion...
Tuesday, August 16, 2022
Cyber Hygiene Best Practices - As cyberattacks become more frequent and severe it is increasingly important for organizations to practice good cyber hygiene to minimize their exposure to risk. Cyber hygiene refers to...
Wednesday, July 20, 2022
Cyber Security for Small Businesses - High-profile cyber attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber crime. Recent surveys conducted by the Small Business Authority,...
Tuesday, June 21, 2022
Hacktivism Explained - Hackers exploit virtual vulnerabilities to gain access to networks and devices illegally. While most engage in this activity for financial gain, others, called hacktivists, have different...
Monday, May 30, 2022
Jackware Cyberattacks Explained - Ransomware incidents entail cybercriminals compromising their victims’ computers or servers with malware and demanding large payments in order to restore the technology (as well as any...
Monday, July 26, 2021
Penetration Testing Explained - Keeping workplace technology up and running is vital to any organization’s success. While this task seems feasible, it’s growing harder and harder each year as cybercriminals expand their...