Insights

Articles & Resources

Subscribe to Receive Updates

Connect

In the News Technical Expertise

What Can Your Company Learn From the Uber Hack?

September 29, 2022

Following a cyberattack on rideshare service Uber, Cybersafe Solutions Chief Information Security Officer Thomas Pioreck discusses lessons learned and expert tips on multi-factor authentication, password protection, and empowering employee incident response.

Read Now
Technical Expertise

The Importance of Multifactor Authentication

September 01, 2022

Multifactor authentication (MFA) involves a two-factor verification of your personal information, making it more challenging for hackers to infiltrate your account and steal sensitive data.

Read Now
Technical Expertise

Visibility Into Endpoint Activity: Endpoint Detection & Response

July 19, 2022

Endpoint Detection and Response (EDR) services continuously monitor desktops, laptops, and mobile devices for suspicious activity, preventing, detecting, and responding to threats before they manifest as attacks.

Read Now
Technical Expertise

What Is Extended Detection & Response (XDR)?

June 28, 2022

Extended detection and response (XDR) services provide multifaceted monitoring of networks, endpoints, and cloud environments 24/7/365 to seamlessly detect, contain, and mitigate cyber threats.

Read Now
Technical Expertise

Essential Tools for Cyber Underwriting

June 14, 2022

During the cyber underwriting process, insurers determine appropriate policy coverage by utilizing tools such as non-invasive scanning, continuous monitoring assessments, breach history reporting, compliance verification, benchmarking, and cyber risk quantification.

Read Now
Technical Expertise

What Can Cyber Insurance Cover?

May 19, 2022

Cyber insurance is a supplemental security measure, helping reduce the damaging effects of a breach and covering claims such as data damage, extortion, and liability.

Read Now
Technical Expertise

Can Businesses Get Hit With Ransomware More Than Once?

May 10, 2022

Yes. If your business has already been the victim of a ransomware attack, the chances for a repeat attack are higher, often due to poor security, lack of continuous monitoring, or because the hacker never left.

Read Now
Technical Expertise

The Cyber Underwriting Process

April 26, 2022

The cyber underwriting process determines policy coverage and entails a comprehensive assessment by insurers of a company’s existing monitoring software, data management, security procedures, breach history, relative benchmark, and more.

Read Now
Technical Expertise

What Is Cyber Underwriting?

April 08, 2022

Cyber underwriting is the process by which insurance firms assess businesses’ risk exposures and the extent to which they are mitigated when coordinating policy coverage.

Read Now