Playing the Odds

Playing the Odds   The odds that an unidentified (or unpatched) vulnerability in your network defenses will be exploited by ransomware are no longer negligible.  This is dues to the porous nature of modern networks and applications, coupled with the realization...

IT risks and insurance

Insuring against IT risks in small and medium sized (SME) organizations is becoming more important: The move to the cloud makes the employee endpoints the data hub. Employees download, process and upload data. Some data gets left on the endpoint and may get uploaded...

How does Actifile calculate the Data Privacy Risk?

Actifile’s Risk Portal displays risk as number of files, number of records and an estimated assessment of the monetary risk the data would pose if a data privacy incident were to happen. One question we get asked quite often is about this $ value: “how do...

Risk-to-data or Risk-in-data?

The risk-to-the-data              vs. the-risk-in-the-data.    It is intuitively accepted that when securing or insuring a jewelry store the security expenses and the premiums would be related to the Carat value of the jewels in the store. A fake jewelry store...

Data or Exploit? Focusing in on the risk.

MSPs leverage cybersecurity tool stacks (or integrated platforms) to address their customers threat landscape (viruses, malware, ransomware, vulnerabilities and exploits) and to help ensure that continuity and disaster recovery are fully addressed. The best stacks...