Cyber Attacks

cyber attack

Are you prepared?   Unlike physical threats that prompt immediate action—like stopping, dropping and rolling if you catch on fire—cyber threats are often difficult to identify and understand. Cyber threats include dangers such as viruses erasing entire systems, intruders breaking into systems and altering files, intruders using your computer or device to attack others and… [Read More]

10 Reasons Your Business Needs Cyber Insurance

business cyber attack

Article text provided by Evolve MGA, www.evolvemga.com 1. Cyber crime is the fastest growing crime in the world, but most attacks are not covered by standard property or crime insurance policies. New crimes are emerging every day. The internet means that your busi ness is now exposed to the world’s criminals and is vulnerable to attack… [Read More]

IoT Devices in the Workplace

Internet of Things

Keep data safety in mind when setting up office technology   An internet of things (IoT) device is any smart device that is connected to the internet. Many of these devices are everyday objects—like watches or thermostats—that connect via Wi-Fi, allowing users to control them remotely or even collect data. Employers pride themselves on using IoT technology… [Read More]

Personal Data Safety

personal data safety

Secure your personal information from cyber criminals   Do you have a love/hate relationship with the internet? If you’re like most people, you rely on the ease and convenience it brings to your life. Forgot to order your mom a birthday present? You can have it shipped same-day. Need to avoid road construction on the way… [Read More]

25 Most Commonly Stolen Passwords

commonly stolen passwords

How clever is your password? If it’s on the list below, your password is just as easily stolen as it is remembered. Protect yourself by making sure you’re not using one of the top 25 most commonly stolen passwords of 2017, as determined by IT security firm SplashData. To create a more secure password, make… [Read More]