Cyber Bites
Cost of a Cyber Breach
The cost of a cyber breach could devastate your firm. Investment into cybersecurity protects you by mitigating risk of a breach and increasing the likelihood ...
More
Travel Securely
Usage of a VPN when traveling is the best practice for protecting your data across the internet. There are two major issues however that threaten ...
More
Cybersecurity Insurance
Having Cybersecurity Insurance does not guarantee payout in the event of a claim. In fact, a cybersecurity claim could be denied from the outset if ...
More
Cybersecurity Risk Assessment
Are you a seller ready to exit or gain momentum by joining a bigger firm? Are you a buyer ready to acquire a successful firm ...
More
Surprise audit from regulators
Are you ready for a surprise audit from regulators? Do you have all your cyber program policies in place and can you evidence it? Would ...
More
Printers and scanners
Printers and scanners are often forgotten devices that are important for your firm’s cybersecurity. Did you know there’s a feature on some printers or scanners ...
More
The Dark Web
The Dark Web is a hidden part of the internet used for illicit purposes. Hackers put stolen credentials up there for sale. A password prefix ...
More
Properly decommission a computer
There are two options to properly decommission a computer used to access or store private data: destroy or repurpose. You can destroy the hard disk ...
More
A Password Manager app offers ideal balance between security and time-saving access
To protect access to private data, strengthen your credentials by using a Password Manager to securely store them. Password data is robustly encrypted to your ...
More
Use of a complex username diminishes risk of malicious algorithms
When a username is created properly it serves as additional security. Use of a complex username diminishes risk of malicious algorithms being able to predict ...
More