Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

Defending Your Digital Frontier: A Smart Guide to Effective Cyber Incident Planning for SMEs

shield with green and blue light

Reference the infographic here. Lacking the deep resources of their larger counterparts, small and midsize enterprises (SMEs) face an uphill battle in cybersecurity. However, what many SMEs lack in resources can be made up with comprehensive planning to ensure that they react swiftly to any potential cybersecurity attack. Perhaps that’s why the Cybersecurity and Infrastructure […]

The Kaseya Ransomware Attack: What Businesses Need To Know

On July 2, 2021, Kaseya, a software provider, announced that it had been attacked and that some of its clients may have been affected. The company advised its clients to shut down any VSA servers they’re running to prevent any potential or further breach in their systems. Unfortunately, the company’s efforts were futile, and the […]

6 Signs of a Ransomware Attack

ransomware_attacks_hero_image

People often think that ransomware attacks just happen, but really, there are several warning signs that indicate they are about to take place. Knowing what these signs are can help you spot a ransomware attack much earlier, potentially limiting damage. Automated vs. Human-operated Ransomware Before getting into the six warning signs of a ransomware attack, […]

Ransomware payouts reach record levels in 2021 as extortion becomes more sophisticated

ransomware_2022_hero_image

Cybercriminals are flush with cash from successful ransomware campaigns, and they are using more sophisticated technology and tactics to drive up ransomware payments even further, with the Conti ransomware group leading the way. According to a report released by Palo Alto Networks’ Unit 42, the average ransom demand rose 144% to $2.2 million in 2021, […]

The State of Ransomware in 2022

hacker_carrying_out_a ransomware_attack_ hero_image

Ransomware is a troubling form of malware. This malicious software is able to infiltrate a domain or network, encrypt data, and demand a ransom in exchange for a decryption key.  Worse yet, some ransomware will also threaten to expose your data if you refuse to pay. As a result, you could lose valuable information, compromise […]