Everything That Needs to Be Done After a Data Breach

Falling victim to a data breach can be financially devastating for the affected organization and the recovery can be confusing …

Posted in | Comments Off on Everything That Needs to Be Done After a Data Breach

Learning About Healthcare Liability Insurance with Mark Bradway

By Drew M Smith

Below you can learn more about Healthcare Liability Insurance. We interviewed one of our Professional Liability …

Posted in | Comments Off on Learning About Healthcare Liability Insurance with Mark Bradway

PL Risk Advisors to Speak at Cyber Seminar

By Drew M Smith

PFS Insurance Group will be hosting a presentation on Cyber Liability Business Risks at their offices …

Posted in | Comments Off on PL Risk Advisors to Speak at Cyber Seminar

Scary New Emotet Virus Makes Anti-Virus Look Inadequate

By Drew Smith

New Study Reveals Privacy Concerns are Affecting Business

A new much more dangerous computer virus has revealed itself in the last few months. The virus …

Posted in | Comments Off on Scary New Emotet Virus Makes Anti-Virus Look Inadequate

New Facebook Hacking Schemes to Keep an Eye On

By Drew M Smith

Facebook has increasingly been the hunting ground for those looking to steal a user’s personal data. …

Posted in | Comments Off on New Facebook Hacking Schemes to Keep an Eye On

Marriott Breach affects Hundreds of Millions

By Drew Smith

Over the weekend, Marriott, one of the world’s largest hotel chains announced a significant breach into their …

Posted in | Comments Off on Marriott Breach affects Hundreds of Millions

National Cybersecurity Awareness Month

By Drew M Smith

The Department of Homeland Security (DHS) in conjunction with the National Cyber Security Alliance (NSCA) is …

Posted in | Comments Off on National Cybersecurity Awareness Month

Homeland Security Issues New Warning on Fake IT Scam

By Drew M Smith

The Department of Homeland Security issued a warning last week that is very unsettling for businesses …

Posted in | Comments Off on Homeland Security Issues New Warning on Fake IT Scam

The Components of a Cyber Risk Management Checklist

Cyber security is an area of risk management where a person or organization can’t be too cautious in mitigating possible …

Posted in | Comments Off on The Components of a Cyber Risk Management Checklist

Social Media App Hacked due to Inadequate Dual Factor Authentication

By Drew M. Smith

The Social Media service, Reddit, was reportedly breached according to a blog post released August 3rd. …

Posted in | Comments Off on Social Media App Hacked due to Inadequate Dual Factor Authentication