What is phishing and how can you prevent it?
5 minute read
You don’t always need a sophisticated hack to gain access to into a business’ database. In fact, all it could take is one click in an email to compromise your [...]
5 minute read
You don’t always need a sophisticated hack to gain access to into a business’ database. In fact, all it could take is one click in an email to compromise your [...]
4 minute read
During a pandemic, there are a number of things business owners need to think about, ranging from the safety of their employees to their bottom line. But one area of [...]
5 minute read
As technology continues to develop and evolve, businesses need to keep up and protect themselves by preparing for a cyber attack. The 2018 State of Cybersecurity in Small and Medium [...]
5 minute read
With the rising threat of cybercrime, information leaks, and data breaches, protecting your business is vital and password security plays a key role. After all, a strong password is your first line [...]
3 minute read
You’ve no doubt heard or read a story about the impact of cyber breaches on large multi-national corporations, governments, or charities that affect tens of millions of clients, citizens, or [...]
4 minute read
Knowing how to respond well to a data breach is vital for every business. After all, time is money, and a well-developed, thoroughly tested response plan has been proven to [...]
4 minute read
Technology has changed the way consumers shop for almost everything—from music and home decor, to electronics and travel. While online grocery shopping hasn’t yet been disrupted to the same extent [...]
4 minute read
2016 was yet another year where cyber risks, data breaches and cybercrime made international headlines. From the October cyberattack on Dyn that resulted in disrupted internet service across North America [...]
2 minute read
Identifying cyber risks and understanding cyber security is an important area of focus for insurers because technology is always evolving. While the security breaches, data thefts and hackings of major [...]