Cyber insurance is an important element for companies as it covers the damage
and liability caused by a hack, which are usually excluded from traditional
liability coverage. Stricter data privacy notification laws, government
incentives, cloud adoption and the increase in high-profile hacks and data
breaches have all contributed to the significant increase in the number of
companies offering and buying cyber insurance.
All companies face varying levels of risk, which warrants the need for a
cyber insurance policy. You can look at two candidates for such a policy:
first, companies that store data from external sources like retailers,
healthcare companies and financial services firms; and secondly, any company
that stores employee data. Customer information, such as payment details
and addresses are gold to hackers. Obviously, companies that store internal
and e... (more)
Secure Authentication Is the Only Solution to Vulnerable Public Wi-Fi
Wi-Fi has become a necessity of the digital age, and like everything,
everyone loves it even more when it is free. Whether it's used to access a
presentation at a new client meeting, to host a video conference call, or
edit and email important documents, public Wi-Fi means nearly anywhere can
become an office. Couple this with the fact that there are as many mobile
devices on the planet as there are people, and businesses now have the most
flexible and tech-saturated workforce in history.
Recent studies have fo... (more)
It's a given that employee access to corporate systems should be both as
secure and simple as possible. However, time-strapped CIOs under pressure
from demanding staff and challenged with authenticating users all over the
world on multiple devices, have been torn between relying on the fatally
flawed password or hard token two-factor authentication (2FA) approach to
keep their systems secure. As a result, adaptive authentication has gained
popularity as it reduces the time it takes to login by verifying a user based
on their location.
End users want speed, stability and consiste... (more)
It's a given that employee access to corporate systems should be both as
secure and simple as possible. Up until recently however, time-strapped CIOs,
under pressure from demanding staff and challenged with authenticating users
all over the world on multiple devices, have been torn between relying on the
fatally flawed password or hard token two-factor authentication (2FA) to keep
their systems secure.
Recently, adaptive authentication has gained in popularity, as it reduces the
time it takes to log-in by verifying a user based on their location. But is
this the best solution?
... (more)
It is important to accept that threats come in many forms and can affect
businesses greatly, for example, 15 per cent of large organisations suffered
from a security or data breach in the last year involving smartphones or
tablets. With increased employee mobility, businesses must equip staff to
access corporate data from these devices securely.
Data security issues and security breaches within businesses are now a
regular occurrence. Everyday it seems that we are hearing about a new cyber
attack or security flaw and just recently it was announced by CEBR and
Veracode [i] that c... (more)