Driven by the work from home trend, ransomware attacks surged by over 400% in 2021, causing insurers to scale back coverage, raise premiums, and requiring strict new standards to purchase coverage. What should Ohio businesses be doing to keep their cyber insurance policies? Let’s take a deep look.
Read MoreTo counter the threat of ransomware, some businesses have started to rely on cyber insurance policies, which will compensate them for all the costs associated with recovering from a ransomware attack, such as hardware costs, engineering manhours, forensic work, and others. Just a few years ago that may have been a sound strategy, but no longer.
Read MoreAs a business, there is no doubt today that you need to have a presence on major social media platforms such as Facebook, Twitter, Instagram and LinkedIn. Even if social media doesn’t directly drive business to your door, businesses are required at a minimum to have a current presence on platforms. Those that don’t appear behind the times, outdated or too small to handle the extra work.
Read MoreThe unprecedented pandemic caused by the COVID-19 strain is causing health, financial and social crisis worldwide. Populations around the globe are focusing on keeping the virus at bay – except one: population cybercriminal. True to form, cybercriminals around the world are exploiting the public’s fear of contracting the virus and thirst for current to the minute updates to infest business and personal network’s with malware, ransomware and business email compromise.
Read MoreRansomware is malicious software designed to lock computers or data storage until a ransom is paid – keyword malicious. The cyber-criminals who write the code for these attacks mean business, to the tune of millions of dollars lost annually. Here are five tips that could help deflect a ransomware attack on your small to medium sized business.
Read MorePhishing emails are an attempt to obtain sensitive or personal information such as usernames, passwords, financial or personal details by scammers who have disguised themselves as a legitimate business or person. The intent is to use this information for illegal purposes. While the hacking world is constantly changing and evolving its methods to fool the end user, below are 5 things to look for that are immediate red flags an email is a phish.
Read More