cyber insurance

Cyber Insurance Policies: Are You Asking the Right Questions?

According to the 2018 Hiscox Cyber Readiness Report released in February, 58 percent of U.S. firms with more than 250 employees have cyber insurance but only 21 percent with fewer than 250 are covered. What’s even more interesting is that more than half of U.S. small businesses have no intention of investing in cyber insurance. The lack… Read More

lower your security risk

3 Steps You Can Take Now to Lower Your Security Risk

Managing risk across an organization requires a lot of different things: setting strategy, determining tolerance, defining metrics. These are critical in your overall risk management efforts, and even more so in information security. But where do you begin? There’s no denying it can feel like a daunting task. It’s hard to make sure that information… Read More

insider threat detection

How to Get the Most Out of Data Loss Prevention Technology to Improve Insider Threat Detection

Yesterday, I attended our webinar, “How to Unlock the Full Potential of Insider Threat Tools,” and it got me thinking about the relationship between technology and past successes of insider threats. Rich Burke, Vice President of Public Sector, made a critical point during the webinar that failure to detect insiders isn’t exclusively a technology issue. There are plenty… Read More

career in cyber security

Q&A: Essential Tips for Solving the Worker Shortage and Starting a Career in Cyber Security

The week four theme of National Cyber Security Awareness Month (NCSAM) is “The Internet Wants You: Consider a Career in Cybersecurity.” We asked our Vice President of Human Resources, Leah Schmid, to weigh in on this topic. In this week’s blog, she offers her insights into the different issues surrounding the growing shortage of qualified cyber security professionals… Read More

youth code jam 2017

Cyber Handyman Skill #3: Translating Coding and Programming Structures

In our previous blog in the series, “5 DIY Cyber Security Skills Every IT Professional Needs to Master,” I discussed the importance of nmap as a critical command line tool that improves network visibility and overall security. Today, I’ll cover some concepts related to translating coding and programming structures. Being a resident cyber handyman isn’t easy. Not… Read More