by Kelli Young | Dec 26, 2022 | Cyber Liability Insurance
Attack surfaces refer to the total possible entry points (also known as attack vectors) for unauthorized access into any system. The recent increase in remote and hybrid work combined with the shift to the cloud and widespread implementation of software-as-a-service...
by Kelli Young | Dec 19, 2022 | Cyber Liability Insurance
Patch management is the process of acquiring and applying software updates to a variety of endpoints, including mobile devices, computers, servers and embedded devices. Installing patches regularly is necessary to correct errors, help protect data and optimize system...
by Kelli Young | Nov 28, 2022 | Cyber Liability Insurance
Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and other kinds of malware. It provides visibility into security incidents occurring...
by Kelli Young | Oct 10, 2022 | Cyber Liability Insurance
As cyber attacks become more and more common, protecting your data is increasingly difficult. In fact, a study from Juniper Research found that by 2023, cyber criminals are expected to steal an estimated 33 billion records. In light of the growing number of cyber...
by Kelli Young | Aug 29, 2022 | Cyber Liability Insurance
Cyberattacks in public administration including the federal, state and local government agencies have become a top target for cybercriminals. These institutions are frequently attacked because they collect and store highly sensitive information and often lack proper...
by Kelli Young | Aug 22, 2022 | Cyber Liability Insurance
A distributed denial-of-service (DDoS) cyberattack occurs when a cybercriminal attempts to interrupt an online service by flooding it with fake traffic. This attack can be achieved by overwhelming various aspects of an organization’s system, such as servers, devices,...