Cybersecurity

May 3, 2017
Comments [0]

The number of records compromised by cyber criminals is skyrocketing, according to findings of digital security giant Gemalto.

The Netherlands-based company says its 2016 Breach Level Index, a global database that tracks data breaches, found nearly 1.4 billion records were compromised worldwide last year—an 86 percent increase over 2015....

Read More
May 1, 2017
Comments [0]

International business travelers take heed: Starting now, and even more so going forward, you’ll need to carefully consider how your computing devices serve as a conduit to sensitive company data.

This includes everything stored directly on your smartphones and laptops—and everything reachable from your personal computing devices that may be stored in the internet cloud.

Electronic media...

Read More
April 27, 2017
Comments [0]

There was at time 15 years ago when we fully expected the latest, coolest software to come riddled with aggravating bugs. Consumers were trained to expect that the software vendor would fix the glitches in version 1.1 or 1.2.

Software developers today remain under more pressure than ever to rush to market with the coolest functionalities. But those that do so create fresh vulnerabilities that cyber criminals pounce on to breach business networks and cause other havoc.

Factor in...

Read More
April 6, 2017
Comments [0]

It’s no secret that cybersecurity has become a more pressing issue over the past decade. According to a PWC Global State of the Information Security Survey in 2015, the number of cybersecurity incidents has increased at an annual rate of 66 percent. Both the range and complexity of cyber threats are expanding—from ransomware to compromises of critical infrastructure.

Yet, when those threats materialize, too few businesses and...

Read More
March 31, 2017
Comments [0]

Two bold pronouncements—one in the United States and the other in the U.K.—have poured kerosene onto the flickering debate about privacy vs. the need for surveillance.

First came President Trump’s executive order, issued March 6, signaling that travelers entering the U.S.—including attorneys with cloud access to client information—could have their digital devices ...

Read More
March 25, 2017
Comments [0]

Employees today expect benefits to go beyond physical health to a broader concept of wellness.

The employee benefits industry has answered the call, giving employers and brokers more benefits that offer employees tools to better navigate their lives.

Here are the top seven benefits to consider for upcoming enrollment periods that help look after employees personal well-being:

1. Legal protection - Employees may require costly...

Read More
March 14, 2017
Comments [0]

Chances are your organization has made critical investments in technology to deliver convenience and cost savings to customers.

But for these investments to work, you need to make sure the new technologies also safeguard your customers’ identities and privacy.

In this webinar from Aberdeen Group and CyberScout, cyber security experts came together to disucss how changing user expectations...

Read More
March 14, 2017
Comments [0]

The countdown is on. Financial institutions doing business in New York must comply with new cyber security rules from the state’s financial regulator by March 2018.

These revamped regulations—the first of their kind nationwide—will impose stringent cyber security requirements on banks, insurers and other institutions regulated by the state’s Department of Financial Services.

...

Read More
March 1, 2017
Comments [0]

The most common credentials are a combination of username and password, but those have lost a good bit of their protective powers. Next-generation credentials also are edging toward a precarious place. Here’s what you need to know about the dangers of compromised credentials and how to mitigate those risks.

The speed of work these days puts enormous pressures on InfoSec, IT and workers alike to rush the credentialing process. Employees, contractors and...

Read More
February 17, 2017
Comments [0]

Imagine your business has no access to electronic information on computers or a network. No file shares, Word documents, email, databases, or Excel spreadsheets. No PDFs. No applications. No access to Windows. How much would your organization be willing to pay to regain access and control over its information and systems? Cyber criminals are counting on this readiness to pay when they unleash ransomware on an organization.  

...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started