The office has been disinfected, work spaces are rearranged, and now we can begin our return to working in the office. But has the company planned for IT security challenges? Tab Bradshaw, Chief Operating Officer at Redpoint Security, has put together…
Read More
Category: Commercial, Education, Employees, Risk Management, Technology
Tags: backup, backup solutions, cyber, cyber security, cybersecurity, data, data restoration, information technology, loss prevention, malware, malware attack, Microsoft Office, multi-factor authentication, office, operating system, original equipment manufacturer, preventative maintenance, ransomware, risk management, software, vpn, web browser
COVID-19 has forced people from their workplaces and schools. Working from home and homeschooling means that millions of Americans are using video conferencing for the first time. With this surge in new users, there will be many cybersecurity challenges. Here’s…
Read More
Category: Business, Commercial, Communication, Employees, Personal, Prevention, Technology
Tags: communication, computer attacks, cyber, cyber hygiene, cyber risk, cyber security, cyberattack, CyberScout, cybersecurity, data, hackers, Internet, malware, malware attack, mobile security, phishing, ransomware, scam, secure, security, smishing, vishing, webcam
We have probably all been to a public building where there are signs offering a free service to plug in your device at a charging location. Without thinking, we hurriedly plug in our device to the USB, by either using our…
Read More
Category: Personal, Prevention, Technology
Tags: cell phone, cyber security, cybersecurity, data, data backup, data breach, malware, malware attack, mobile device, mobile security, Personal Cyber Protection, personal data, personal information, personal insurance, protecting your data, smart phone, USB flash drive
Just in time for National Cybersecurity Awareness Month, the Identity Theft Resource Center in conjunction with CyberScout has released a survey entitled “Social Media Habits and You.” The survey focuses on how parents and guardians monitor their kids’ online behavior,…
Read More
Category: Central, Education, Home, Personal, Risk Management, Technology
Tags: credit freeze, cyber hygiene, malware attack, National Cyber Security Awareness Month, phishing, technology
We keep a lot of important information stored safely away on our computers. We trust that the next time we power on the device, it will be there for us to use…until it’s not. For me, the situation became all…
Read More
Category: Business, Education, Personal, Prevention, Risk Management, Technology
Tags: backup solutions, computer attacks, computer storage, data backup, malicious software, malware attack, Personal Cyber Protection
Amanda, only four months on the job as the new risk manager of a large manufacturing company, was walking into a crisis management meeting with the company’s senior leadership. The issue was serious: the company had suffered a data breach.
Read More
Category: Business, Commercial, Liability, Risk Management, Technology
Tags: business income loss, computer attacks, cyber, cyber attack, cyber insurance, cyber liability, cyber risk, data breach, data restoration, denial of service attack, denial of service attacks, malware attack, public relations, risk management, risk manager, virus
Amanda, the chief logistics officer of a large wholesaler of office supplies, was excited about the start of Fall. It was getting cooler and the leaves were falling. Halloween was just around the corner, and that would mean the chance…
Read More
Category: Business, Central, Commercial, Risk Management, Technology
Tags: computer error, computer system, computer virus, corrupted file, CRM system, customer relations management system, cyber insurance, malicious software, malware, malware attack, worm