}
Redeveloping Florida’s Remote Southern Coast

Redeveloping Florida’s Remote Southern Coast

[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=””...

Current Cyber Threats and Market Update

Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare, higher education, and financial services. But all companies have email,...

PCI and The C suite

Cyber security and pre breach planning need to be a priority of the C Suite.  Executives who think they can leave these issues solely to the IT team do so at their own peril
Breach planning basics – Part 2

Breach planning basics – Part 2

In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP).  Among them were designating a member of management to be responsible for the IRP, and selecting employees from management, IT, legal, marketing, and...
Breach planning basics – Part 1

Breach planning basics – Part 1

We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance, education, and medicine, still have valuable information that someone...
Cyber Extortion is Real and Can Be Catastrophic

Cyber Extortion is Real and Can Be Catastrophic

Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing.  At risk in a digital extortion attack is not only a company’s reputation and data, but also its ability to function and even its very...