Cyber Insurance

19 articles
Your Local Insurance Agent

Your Local Insurance Agent

Our Story Essential for life. A powerful protectant, zinc is woven through every form of life we know. So, by nature, our instinct is to protect, to insure. Seeking the best source for that protection, you come full circle: Welcome to ZINC. Symbiotic relationships keep life moving, advancing. This simple truth is at the heart of what ZINC does. Our…
Tax Season Phishing: Peak Time for Big Game

Tax Season Phishing: Peak Time for Big Game

If you follow our Facebook and Twitter feeds then you’ve got a leg up—you know all about the growing phishing epidemic. Well-worded emails from supposed IRS workers or company execs have mislead many a dutiful employee. We’ve warned about this scamming method in the past, and the widespread threat continues to morph. The need for vigilance is vital. For while…
Data Privacy: It Does a Business Good

Data Privacy: It Does a Business Good

Respecting Privacy, Safeguarding Data and Enabling Trust. These tried-and-true tenets resurface every January 28th for the National Cyber Security Alliance’s (NCSA) annual Data Privacy Day (DPD), and 2017 was no exception. DPD’16 saw unprecedented media coverage and impressive levels of engagement online and via social media. Building on that success, the NCSA and its top-notch advisors encouraged even further involvement…
Wiring the Workplace: Grounding Your Cyber Culture

Wiring the Workplace: Grounding Your Cyber Culture

We’re in the home stretch, and 2016 sure was one for the record books, cybersecurity- and other-wise. We’ll spare you a play-by-play, but suffice it to say in the world of all things cyber, we’ve hit a whole ‘nother level. And the upward trend continues, with abundant predictions of threats and concerns looming over the upcoming year. Rounding the bend,…

Cyber Survivor: 6 Tips to Stay Alive

All too often repetition fails at urgency, and as irony goes, the very topic we’re deaf to is the one that should have us all ears. Despite unending cycles of data breaches and subsequent warnings, 60% of small businesses will sustain fatal damage at the hands of cyber criminals. In such a harsh environment, only the fit survive. That’s why…

Zn Dy feature logowifi spoofing (AKA “evil twin”; “man-in-the-middle”): Just as fake as your favorite late show parody, but day and night when it comes to comic relief. A technique used by cyber criminals to trick internet users into trusting bogus wireless networks, WiFi spoofing is no laughing matter. In an attempt to lead the unsuspecting down a path ending in compromised personal data, WiFi spoofing preys on users’ trust, tantalizes with convenience, and relies on our distraction. When traveling, the risk can’t be overstated, with an estimated 89% of global hotspots reported as unsecure. With the help of apps and online tutorials, it’s relatively easy for the average computer literate person to spoof. The resulting reach is broad, and it’s been used to fool folks for years. So while we all love the thought of free WiFi, the fraud and theft that could tag along should make us think twice. How to skip out on the spoof? Check—double and triple—that the network you’re joining is legit, and avoid password-free WiFi. Encryption is key to a secure connection, so always look for “https” in the address bar. And be sure the settings on your device don’t give it free reign to connect at will to any available network. With a few tips under your belt and eyes wide open, you won’t let cyber criminals have the last laugh.

Want more? Subscribe.
070116

Zn Dy feature logopci compliance: Don’t let the snore-bore of a name fool you: PCI compliance standards could be your company’s lifeline, packing a solid punch in fighting cybercrime, protecting data security. A set of requirements designed to ensure that ALL companies that “process, store or transmit credit card information” are ardently working to protect said data, PCI compliance is a must. Setting standards and covering tails, PCI compliance opens the door to insurance coverage for really important things, like, say, data breaches. Not only does PCI compliance aim to keep your clients safe and you in the clear, it also keeps hard-earned funds from being thrown away on legal fees, fines and penalties. But PCI compliance is more than “just good business”— it’s a way to show clients some love, proving that you value the trust they’ve placed in your company.

Want more? Subscribe.
041416
Annual Cybersecurity Update

Annual Cybersecurity Update

Another Year of What Seems Like So Much Cyberwocky One more 365, come and gone. Our hyperconnected lives keep us always on the lookout for the next update, the hottest feature, the latest trends for the new year. But then that's also just how we're wired. Yet while we love to leap ahead, a look back can be beneficial too—good,…

Zn Dy feature logowhaling attack: Not your momma’s attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company’s “big phish,” gaining insider access to company jewels. An offshoot of the well-known “phishing” attack, whaling is insidious and calculated deceit, with the end goal of exploiting business leaders’ personal devices. And unless execs know what to look for, they can easily be duped. This is no casual spam scam—attackers research correct titles, company information, even personal details in an effort to sound legit. Social media can play a huge part in the harvest, and along with being judicious in detail sharing, experts recommend quizzes and social pen-testing to expose vulnerabilities. Those in the know also predict that in the coming year, execs will need to be ever more vigilant if they hope to evade the hunters. Sounds like it’s time to drop anchor and chart a new course—toward protection.

Want more? Subscribe.

012716
National Cyber Security Awareness Month 2015

National Cyber Security Awareness Month 2015

Another year has come and gone; those 365 days move faster than ever. Today’s rapid time movement is reminiscent of the constant advances in technology, and how those changes beget shifts in cyber awareness—it’s hard to keep up! ‘New’ is often synonymous with ‘vulnerable,’ and staying on top of the latest—be it news, updates, or training—can be a tall order.…