Is hiding a data breach ever a good idea?

Is hiding a data breach ever a good idea?

Is hiding a data breach ever a good idea? You may think the answer is obvious, but we do get questions like this.  So did Joe Brunsman, an insurance broker who specializes in cyber coverage.  Click here to watch Joe’s video with the answers to five questions...
Threat Intelligence from buzzword to value

Threat Intelligence from buzzword to value

“Threat Intelligence” seems like a pretty common buzzword these days. Pretty much everyone security vendor says they have threat intelligence. But, what is it, and is it enough to just ‘have’ threat intelligence? Wikipedia defines threat intelligence as “Cyber threat...
Cyber attacks on higher education show room for improvements

Cyber attacks on higher education show room for improvements

A cyber attack at the beginning of 2021 is being described by the University of Colorado’s President as “the largest, most complex incident involving data that the system has ever seen.”  This exposure was caused by the breach of their third-party...
True stories of cyber risks

True stories of cyber risks

Understanding actual cyber incidents that others have experienced can help businesses identify where they may also be at risk.  Each of these scenarios is an actual incident with identifiable details removed. Unauthorized access risk:  Suspicious email activity was...
MSPs and CSPs Targeted – What Steps To Take Now

MSPs and CSPs Targeted – What Steps To Take Now

The Cybersecurity and Infrastructure Security Agency (CISA) issued a warning for Managed Security Providers (MSPs) and Cloud Security Providers (CSPs) that they were at high risk of cyber attacks.  Why the focus on MSPs and CSPs?  Gaining access to these types of...
What is the motivation behind ransomware?

What is the motivation behind ransomware?

Is the motivation behind these faceless attacks simply greed?  Talos Intelligence Group interviewed a hacker referred to as “Aleks”, a university-educated Russian male who says he taught himself cybersecurity skills to find new vulnerabilities and gain...