Cyber Insurance

20 articles
National Cyber Security Awareness Month 2015

National Cyber Security Awareness Month 2015

Another year has come and gone; those 365 days move faster than ever. Today’s rapid time movement is reminiscent of the constant advances in technology, and how those changes beget shifts in cyber awareness—it’s hard to keep up! ‘New’ is often synonymous with ‘vulnerable,’ and staying on top of the latest—be it news, updates, or training—can be a tall order.…
Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

Opposites Distract: Successfully Confronting the IT / C-Suite Struggle

For today's business, things have reached critical mass. Not only are we seeing data breaches at every turn, but we're also finding fractured camps at their root—'civil war' within an already raging 'cyber war.' If this sounds familiar, take heart—big problems, both real and perceived, can be worked through and neutralized. It comes down to communication, to going beyond department…

Zn Dy feature logozombie: Just as deadly as its cannibalistic sound-alike, infinitely sneakier. A compromised link in an infected chain of computers, a zombie loves to share the filth. Taking direction from a remote ‘bot master’ with an evil agenda, a group of zombies carry out malicious tasks undetected. Computer owners are often totally unaware as information is surreptitiously harvested, viruses multiply, and the zombie wave grows. Stop the spread: Diligently update software and antivirus programs, always pre-scan thumb drives, and learn to love your firewall. Keep making smart cyber choices. Help stop the apocalypse.

Want more? Subscribe.

012815
Offensive Cyber Defense

Offensive Cyber Defense

It's More than Just Crude Security As we round January’s corner into the new year, there’s so much to think about, from ambitious goals and adventurous plans, to lingering concerns. One thing’s for sure, with a slew of unprecedented data breaches, 2014 did what it could to keep cybersecurity on the brain. So whether it’s still taxing our nerves, or…
8 Steps to Cyber Savvy

8 Steps to Cyber Savvy

Your Cybersecurity Survival List This last week of National Cyber Security Awareness Month (NCSAM), the focus has been on small businesses and the part they play in the great cyber debate. Let’s sum it up. By taking a look at the numbers, evaluating research, and gleaning advice, we can help your business to flex in the shifting winds. Especially as…

Zn Dy feature logodictionary attack: A logophile tongue-lashing? Wishful thinking. This “dictionary” is the cyber bully’s tool. Using automation, hackers systematically try every entry as a password, hoping you chose “puppy” or “daisies”—or dare we say, “password”—to secure your sensitive data. Such an attack can also aim to find a decryption key, thereby rendering your encrypted files defenseless. What to do? A long, strong password derived from a combination of letters, numbers and symbols is an obvious start. Limiting password attempts to three in a row, with subsequent wait time is also a plan. Better still? Frequently change your complex passwords—Deciphering will be so time consuming, you will send the bad guys packing.

Want more? Subscribe.

102414
Leveraging Data Protection in the Face of Shifting Responsibility

Leveraging Data Protection in the Face of Shifting Responsibility

Blame Game Heartbleed, BladeLogic, Backoff: These aren’t the names we remember. All too quickly we forget the lurking threat of malware and its perpetrators, while their victims’ names linger in our collective consciousness. We remember the scandal, but forget the warning. Technologies are evolving exponentially, with hackers riding the wave of progress toward malevolent ends. Executives and IT experts alike…

Zn Dy feature logowatering hole: The cyber equivalent of your standard nature documentary scene, this shady strategy uses employees’ browsing habits against them, infecting oft-visited sites—like the local pizza joint you order lunch from every Friday—with malware. When an unsuspecting user visits this familiar site, his computer becomes infected, giving hackers access to sensitive information. How do you protect from what no amount of internal security can prevent? Goes without saying: back up plans are vital as cybercrime threats become increasingly evasive.

Want more? Subscribe.

071614
Cyber Insecurity: Building on Unstable Ground

Cyber Insecurity: Building on Unstable Ground

Buttressing Your Business Against All Odds In your world, your business is of highest priority. You sacrifice to meet client needs, work late to meet deadlines—You make things happen. Yet, while you’re building your house, the nefarious underground is working just as hard, chipping away at your foundation. Bit by bit, one client record at a time, your rock-solid reputation…
The Cybercrime Reality

The Cybercrime Reality

Storming the Castle Your opponent is closing in. Pawns down, knights watching from the sidelines; Checkmate is only a maneuver away. But hark! Fast-traveling rooks waste no time. Swooping in, they “castle” the king, and the game goes on. Referred to as a “heavy piece” in the game of chess, the rook is a powerful, agile defense. Yet, such a…