Category Archives: Cyber Liability

FBI Urges Consumers to Reset Their Routers to Prevent Malware Attack

FBI URGES CONSUMERS TO RESET THEIR ROUTERS TO PREVENT A MALWARE ATTACK Recently, researchers at Talos—a cyber intelligence unit of Cisco—warned consumers of malware (malicious software) that specifically targets networking devices. The malware, which is known as VPNFilter, impacts an estimated 500,000 routers worldwide, particularly targeting devices from the following manufacturers: Linksys MikroTik Netgear QNAP…
Read more

Complying With The GDPR

COMPLYING WITH THE GDPR Most businesses view their customers’ personal data as a digital commodity that can help with marketing, customer retention, analytics and more. However, the European Union’s (EU) upcoming General Data Protection Regulation (GDPR) comes into force on May 25, 2018, and will require businesses to give EU citizens much more control over…
Read more

The BIGGEST THREAT to your cyber security is your EMPLOYEES

The BIGGEST THREAT to your cyber security is your EMPLOYEES According to historical claim data analyzed by Willis Towers Watson, 90% of all cyber security claims stemmed from some type of employee error or behavior. If you think your organization couldn't possible fall victim to a cyber attach, you're wrong. Cyber attacks can happen to…
Read more

Computer Security Flaws Discovered

Computer Security Flaws Discovered Critical Cyber Exploits Affect Nearly All Computers Cyber security researchers recently announced the discovery of two major security flaws that could allow hackers to bypass regular security measures and obtain normally inaccessible data. The flaws, referred to as Meltdown and Spectre, are both caused by design flaws found in nearly all…
Read more

Cyber Security

Cyber Security Every day, more than 1 million people become victims of cyber crime, according to a study by Symantec, a computer security software company. Businesses, both large and small, are increasingly reliant on the Internet for daily operations, creating attractive and potentially lucrative targets for cyber criminals. With such heavy use of and reliance…
Read more