The Nation's First ISO Registered Independent Insurance Agency

OFFICES THROUGHOUT NORTHEAST OHIO

Library Category: Cyber Portal

Protect yourself and your business by recognizing and reporting phishing threats Here s a guide on how to spot some of the most common phishing scams
Watch our Social Engineering Phishing and Multi Factor Authentication webinar and learn more about how to protect your business from cyber attacks
In a post COVID world telecommuting has become more widely accepted and often expected There is no definitive answer as to whether telecommuting will be good or bad for your business long term
A compromised inbox is a treasure trove of corporate information that can then be exploited by a cunning criminal
By applying multi factor verification to more of your accounts such as email social media and more you can better secure your information and identity online
Download and adapt this sample Cyber Security Policy for your organization A Cyber Security Policy forms the foundation of the corporate Information Security Program and enables the IT team to manage the security of information assets and maintain accountability
It is often assumed that smaller businesses can escape attention from cyber crooks but according to industry experts an increasing number of data breaches are occurring at companies with fewer than 100 employees
While no cyber security method is foolproof using two factor authentication can add an extra layer of security to your online accounts
It s important for board members to be actively involved in developing and promoting effective workplace cybersecurity measures especially as it pertains to ransomware attacks
It s not enough to simply protect workplace technology with software and security protocols It s also critical for your organization to test the overall effectiveness of these protocols on a regular basis That s where penetration testing can help
While there are numerous benefits of implementing a BYOD policy at your workplace it can be problematic from an e discovery standpoint should your company enter litigation
It s important to remember that HIPAA protects patients not covered entities That s why it s critical that your organization has a cyber liability insurance policy to cover any potential data breaches
Because of the increase in the number of intangible assets companies possess and the number of companies doing business on the Internet new types of liability coverages have emerged to meet specific needs
Not only does involvement from leadership improve cyber security it can also reduce liability for board members To help oversee their organization s cyber risk management boards should ask the following questions
Making a strong password is really important But one strong password won t keep you secure With the rise of corporate data breaches learn the best strategy to keep all of your accounts secure from cyberattack
Cyberattacks on global supply chains can cause irreparable harm to an organization s operational financial and reputational wellness While it s not possible to totally eliminate supply chain risk there are several steps your organization can take to reduce your supply chain exposure
As ransomware attacks continue to rise in both cost and frequency throughout the country the federal government is urging businesses to take this evolving cyber threat seriously
Proper password management reduces the risk of compromise of password based authentication systems