What is the Cybersecurity Maturity Model Certification?*
Posted: January 9, 2021
What is the Cybersecurity Maturity Model Certification?*What is CMMC? The first step to learning about the Cybersecurity Maturity Model Certification (CMMC) is to understand its mission. The Cybersecurity Maturity Model Certification Accreditation Body, also known as the CMMC-AB, "establishes and oversees a qualified, trained, and high-fidelity community of assessors that can deliver consistent and informative assessments to participating organizations against a defined set of controls/best practices within the Cybersecurity Maturity Model...
How Does Technology Errors & Omissions Insurance Work?
Posted: December 23, 2020
How Does Technology Errors & Omissions Insurance Work?What is Tech E&O? TechE&O or Technology professional liability insurance helps protect professionals from any errors, omissions, mistakes, or negligence in the technology services or products you may offer to your clients. Your small mistake or missing a deadline can lead to website downtime or lost sales for a client of yours. These situations can cause serious financial losses and can be very costly if...
Understanding your Cybersecurity Insurance Policy!
Posted: December 15, 2020
Understanding your Cybersecurity Insurance Policy!All business insurance policies are not created equal. Simply having a cyber insurance policy for your business does not mean it covers the different types of risks that your organization may be exposed to. It is therefore very important to understand exactly what is being offered so that you can compare different offerings, assess which offering provides you the best value, make an informed decision,...
Ransomware and Cyber Attacks Grow with Enhanced Technology
Posted: November 2, 2020
Ransomware and Cyber Attacks Grow with Enhanced TechnologyJust last week, a New York healthcare system was in jeopardy. Ryuk Ransomware successfully disconnected its IT system within hours of the initial attack! How come this was not detected? A new form of ransom was not identified by the antivirus software providers and security agencies. With protocol in place, the hospital restored the IT operations and rebooted their system - the same day as...
Fraud and Scams: Beyond Phishing Emails!
Posted: October 10, 2020
Fraud and Scams: Beyond Phishing Emails!Imagine a call or voice message that appears to come from a trusted source, such as your bank, credit card company, or from a company that you had recent purchase from like Best Buy or Apple store. In reality, it is a disguised attempt to compromise your identity, credentials, or financial information. Social Engineering is EVER evolving! Though it sounds like an awesome degree, social...