by Jon Lloyd | Aug 3, 2023 | Security
Secure access service edge (SASE, pronounced “sassy”) merges cloud networking and security by combining software-defined wide area networks (SD-WAN) with secure service edge (SSE) protocols. This blend of technologies streamlines overall security posture,...
by Jon Lloyd | Apr 20, 2023 | Cloud, Security
Traditionally, it has been common security practice for a company to deploy a single firewall for each branch. Legacy networks were much less complicated, with most businesses having a single edge (where devices meet the Internet). However, the shift to remote work...
by John Bruggeman | Mar 30, 2023 | Security
Throughout this series, we have reviewed the steps to secure cyber insurance coverage. Part 1 is an overview of the critical concepts of cyber insurance and why your business needs it; part 2 outlines the insurance application questionnaire, and part 3 reviews...
by Eric Bell | Mar 23, 2023 | Security
Security is one of the most vital components when implementing a digital transformation strategy. How will mission-critical data be protected when stored in a cloud or mobile environment? The benefits of digital transformation become irrelevant if sensitive data is...
by John Bruggeman | Mar 16, 2023 | Security
In the first two parts of our cybersecurity insurance series, we discussed the need for cyber risk insurance and common questions insurance agents ask. In this post, we will discuss how to answer these questions and strategies to close potential security gaps that...
by John Bruggeman | Mar 2, 2023 | Security
In the previous post in this cybersecurity blog series, we gave an overview of cyber insurance, how it works, and who should purchase it. Once companies have done the preliminary research and decided to purchase a policy, it’s time to prepare for a conversation...