}

News

The Intriguing Story of LabMD – Part 1

The Intriguing Story of LabMD – Part 1

This is a rather different story of a cyber breach than what we usually write about. Instead of a company pitted against an unknown hacker whose identity will probably never be known, this one is about the cyber fight of one company, LabMD, with another, Tiversa. It...

read more
Penetration Tests

Penetration Tests

To offer maximum value to our insureds and stand out from the competition, we as insurance professionals need to do more than just offer our clients good coverage. We also need to help them with the bigger risk management picture. For example, you may sell your client...

read more
Overcoming Client Objections to Cyber Coverage – Part 1

Overcoming Client Objections to Cyber Coverage – Part 1

“Cyber Liability... What is that, exactly? Do you mean data breach insurance? That has something to do with technology, right? Like, internet insurance?” These were some of the questions we saw in the early years of cyber liability products. Today though, the...

read more
Physical Security is Vital to Defend Against Hacking

Physical Security is Vital to Defend Against Hacking

There are a lot of things that a business can do to from a digital standpoint to boost its IT security, and we’ve written repeatedly about some of these methods. But physical security of computer resources, and particularly laptops, is also critical in maintaining a...

read more
Redeveloping Florida’s Remote Southern Coast

Redeveloping Florida’s Remote Southern Coast

[fusion_builder_container hundred_percent="no" equal_height_columns="no" menu_anchor="" hide_on_mobile="small-visibility,medium-visibility,large-visibility" class="" id="" background_color="" background_image="" background_position="center center"...

read more

Current Cyber Threats and Market Update

Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare, higher education, and financial services. But all companies have email,...

read more

PCI and The C suite

Cyber security and pre breach planning need to be a priority of the C Suite.  Executives who think they can leave these issues solely to the IT team do so at their own peril

read more
Breach planning basics – Part 2

Breach planning basics – Part 2

In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP).  Among them were designating a member of management to be responsible for the IRP, and selecting employees from management, IT, legal, marketing, and...

read more
Breach planning basics – Part 1

Breach planning basics – Part 1

We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance, education, and medicine, still have valuable information that someone...

read more

Newsletter Sign Up

3 + 10 =

Please fill out the form below to receive a quote from one of our specialists. If you need immediate assistance, please call us at 1-888-932-7475.

Contact Us

What Information are you interested in?

8 + 3 =