After an incredibly damaging and costly run of high-profile cybercrime, many businesses may be relieved to learn they can purchase some protection in the form of Cyber Risk Insurance. With so many companies having their data held hostage of huge dumps of private information, who wouldn’t be a little...

Advanced Persistent Threats (APTs) are the cicadas of malware; they lie dormant for extended periods of time, invisible to everyone. They bide their time while quietly sucking valuable data from the network. Unlike cicadas, however, APTs do a lot more damage than weakening trees before filling...

When a business purchases cyber insurance, they typically assume they’re now covered in the event of a cyber attack, data breach or other incident. However, insurance companies are paying out only a fraction of the time. MSPs are uniquely positioned to both educate customers and prospects...

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="full_width" angled_section="no" text_align="left" background_image_as_pattern="without_pattern"][vc_column][vc_column_text] The proliferation of connected devices has made it nearly impossible to manually keep track of all the computers, servers, printers and mobile devices on a corporate network. Whether it’s new hires, upgraded equipment or employees embracing BYOD policies,...