As remote work, ongoing warfare, and other societal stressors heighten cyber vulnerabilities and attacks, it is crucial to implement cybersecurity best practices such as maintaining password hygiene, zero trust, and cloud backups, among others.
In light of an uptick in cyberattacks, we sat down with Cybersafe Security Sales Engineer James Ewing to discuss the prevalence of cybercrimes in periods of crisis and the importance of measures like multi-factor authentication and continuous monitoring. Disclaimer: Questions and answers have been edited for clarity.
Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.
Endpoint Detection and Response (EDR) services continuously monitor desktops, laptops, and mobile devices for suspicious activity, preventing, detecting, and responding to threats before they manifest as attacks.
During the cyber underwriting process, insurers determine appropriate policy coverage by utilizing tools such as non-invasive scanning, continuous monitoring assessments, breach history reporting, compliance verification, benchmarking, and cyber risk quantification.