Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

MFA: 3 Things to Know

MFA_hero_image

According to the 2021 Verizon Data Breach Investigations Report, around 61% of the breaches that were included in the investigation were caused by the leveraging of stolen or weak passwords by cybercriminals. This staggering percentage highlights the importance of enhanced security procedures, like MFA, when it comes to passwords. Multi-factor authentication, better known as MFA, is a […]

What To Do After a Data Breach: A Guide for SMBs

data_breach_hero_image

It happened. Your company just experienced a data breach. Now what? Keeping in mind that each breach situation is unique, here are the general guidelines, inspired by the Federal Trade Commission (FTC) that can help your company make smart decisions in the wake of a cyber incident. Stop Additional Data LossThe first thing to do […]

Atlassian Vulnerabilities Actively Exploited, Patch Now Available 

atlassian_vulnerability_hero_image

On June 2, 2022, Atlassian released a security advisory disclosing that CVE-2022-26134 was a critical unauthenticated, remote code execution vulnerability found in both Confluence Server 7.18.0 and Confluence Server Data Center 7.4.0 and higher.  What is Atlassian? Atlassian develops and sells a variety of collaboration tools for businesses including Jira and Trello. Atlassian’s Confluence and Data […]

The DarkSide Ransomware Group: An Overview

darkSide_ransomware_group_hero_image

On average, ransomware attacks on businesses occur every 40 seconds. By 2031, it’s expected that the total losses to ransomware among all major industries will reach $265 billion.  These numbers are driven by the increasing illegal cyber activity by ransomware groups that are steadily growing in size and number.  One of these groups is DarkSide […]

What is a Denial of Service Attack?

DoS_attack_ hero_image

Denial-of-Service (DoS) attacks are used to render a computer or network inaccessible to its intended users by flooding it with traffic or sending it information that causes it to crash. An attack of this nature robs legitimate users (such as employees, members, or account holders) of the services and resources they expect. Types of DoS […]