How regulatory standards and cyber insurance inform each other

Should the payment of a ransomware demand be illegal? Should it be regulated in some way? These questions are some examples of the legal minefield that cybersecurity teams must deal with. Governments create legislation and regulations primarily to protect public interests and keep order, ensuring society functions as it should. When related to cyber insurance … More How regulatory standards and cyber insurance inform each other

The cyberthreat that drives businesses towards cyber risk insurance

Many smaller organizations are turning to cyber risk insurance, both to protect against the cost of a cyber incident and to use the extensive post-incident services that insurers provide. If we were to stop people on the street and ask for words to describe the people involved in the world of cyber, there would, undoubtedly, … More The cyberthreat that drives businesses towards cyber risk insurance

Your family, home and small business need a cyber-resilience strategy, too!

Your preparedness to deal with cyberattacks is key for lessening the impact of a successful incident – even in home and small business environments. Cybersecurity Awareness Month (CSAM) is upon us again. Much like European Cyber Security Month (ECSM), this important initiative is focused on raising awareness of the risks associated with the digital world we live in, … More Your family, home and small business need a cyber-resilience strategy, too!

Choosing your MSP: What the Kaseya incident tells us about third‑party cyber risk

Lessons to learn from the Kaseya cyberincident to protect your business’ data when doing business with a MSP. Managed service providers (MSPs) play a critical role in the IT ecosystem. By outsourcing many of their day-to-day IT requirements to these companies, smaller organizations in particular can save costs, improve service levels and focus more resources … More Choosing your MSP: What the Kaseya incident tells us about third‑party cyber risk

From incident to resolution: Essential steps to survive a cyberattack

Monitoring all the events in your corporate network is big data “business.” Any observable phenomena – from logins to downloads, scripts, updates, configuration changes, etc. – happening across all the endpoints, servers, routers, switches and other infrastructure in your network can create event logs that rapidly grow to almost unimaginable mountains of data to be … More From incident to resolution: Essential steps to survive a cyberattack