While the shortage of cybersecurity staff continues, many enterprises are now looking for less volume and for more specialization.Companies need specialists who are well-versed in the threats aimed at the business's environment.
To select the most comprehensive yet affordable cyber insurance plan for your business, it’s critical to first identify who is accessing your confidential data and how they’re accessing it, as this information will largely dictate how your cyber insurance policy is outlined. Ensure your effective policy includes these six key components.
Ignoring cybersecurity whistleblowers or, even worse, subjecting them to retaliation will not fix data security problems. Instead, it will only result in increasing an organization's legal exposure and driving cybersecurity whistleblowers to report externally.
According to a Pew Research study, the vast majority of Americans keep track of their passwords using much more traditional methods – specifically, by memorizing them or by writing them down on a piece of paper.
Between security systems manufacturers, integrators and end users, is anyone fully prepared to mitigate cybersecurity risk?
April 1, 2017
Whether it’s an HVAC system, a point-of-sale terminal or a video surveillance camera, malicious attackers are looking for any way into your network and closer to your valuable data, systems and intellectual property.
It’s been nearly two years since we addressed cyber insurance in the Cyber Tactics column, so I decided to get an update from Bob Parisi, Managing Director at Marsh.