For any business leader or CIO, navigating the world of cybersecurity insurance can be very complicated. It seems as if there are often more questions than answers, it can be difficult to know who you need to speak to in order to get what you need. This article will attempt to provide some direction, point out a few of the pitfalls, and help you to ask the right questions within your organization.
Cybersecurity Insurance for C-Level Executives
Topics: Cybersecurity, cybersecurity insurance, insurance, it risk assessment
Not because budding entrepreneurs haven’t heard the horror stories, but it seldom ranks highly among things that directly generate cash or hurry a company to market. Like so many other priorities, cybersecurity often falls to the wayside in the early business stages.
Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training
As strong as the weakest link
You probably know that having network security in the workplace is important, but what about your home? Most people use their home internet connection for everything from finance to important personal correspondence, all of which should be secured to the individual. In this blog post we will explore some simple tricks that will help you make your home network more difficult for intruders to access.
Topics: Cybersecurity, consumer security, Data Security
The Significance of Data Ownership and Classification
Data ownership and classification are usually initiatives companies think about much after implementing many other layers of controls like firewalls, patching, or antivirus. But because of legislation like Health Insurance Portability and Accountability Act (HIPAA) and the US Family Education Rights and Privacy Act (FERPA) companies are required to know what data they possess and assure they are securing it. Most organizations retain large quantities of data and some even call it “big data” but many do not have the certainty of what type of data it is, what are the data elements, where it is stored, when it should be destroyed, and how to protect it. This article will explore those elements and highlight the importance of data ownership and classification.
Topics: Cybersecurity, Data Classification, Information Security, Data Retention, Data Security, Data Protection, Data Ownership
Topics: Cybersecurity, Network Security, vulerability assessment