Cyber Insurance Checklist for Businesses

Cyber Insurance Checklist for Businesses

Having cyber insurance coverage is one of our 15 recommended elements of a strong security posture for small to mid-sized businesses. Choosing the right cyber insurance policy is a critical decision that can make all the difference, and policies are not created equal....
Cyber Attack Method is Bypassing your Filters

Cyber Attack Method is Bypassing your Filters

Have you heard of callback phishing? Typically a phishing email contains some sort of message requiring the user’s urgent response. But unlike traditional email phishing, it does not contain a URL linked to a malicious site or content. Instead, it contains a phone...
Hacker Holidays!

Hacker Holidays!

Friday marks the official beginning of the holiday shopping season and no one is more excited than cyber hackers. During this time of year, the opportunities to take advantage of unsuspecting and often overwhelmed holiday shoppers create a playground for bad actors....