by John Bruggeman | Mar 30, 2023 | Security
Throughout this series, we have reviewed the steps to secure cyber insurance coverage. Part 1 is an overview of the critical concepts of cyber insurance and why your business needs it; part 2 outlines the insurance application questionnaire, and part 3 reviews...
by John Bruggeman | Mar 16, 2023 | Security
In the first two parts of our cybersecurity insurance series, we discussed the need for cyber risk insurance and common questions insurance agents ask. In this post, we will discuss how to answer these questions and strategies to close potential security gaps that...
by John Bruggeman | Mar 2, 2023 | Security
In the previous post in this cybersecurity blog series, we gave an overview of cyber insurance, how it works, and who should purchase it. Once companies have done the preliminary research and decided to purchase a policy, it’s time to prepare for a conversation...
by John Bruggeman | Feb 23, 2023 | Security
As ransomware attacks become more prevalent, many businesses are turning to cybersecurity insurance to transfer risk and mitigate some of the costs of various cyberattacks. Those negative effects are enough to give even the most confident CEO and CIO pause—a...
by John Bruggeman | Dec 21, 2022 | Security
According to Microsoft’s X-Force Threat Intelligence Index 2022, phishing attacks—which rely on human error and deception—cause 40% of all data breaches. Contrary to popular belief, few cyber-attacks solely consist of technology-based malware. Instead, experts...