The Zero Trust Architecture and MSPs

The Zero Trust Architecture and MSPs

Zero Trust isn’t as new concept in the enterprise space. It was conceptualized in the mid-2000’s, tried by Google (which experience code theft at the time) in the “BeyondCorp” architecture, and subsequently codified by Forrester’s John Kindervag in 2010 (see:...
Data or Exploit? Focusing in on the risk.

Data or Exploit? Focusing in on the risk.

MSPs leverage cybersecurity tool stacks (or integrated platforms) to address their customers threat landscape (viruses, malware, ransomware, vulnerabilities and exploits) and to help ensure that continuity and disaster recovery are fully addressed. The best stacks...
The risk-to-the-data Vs. the-risk-in-the-data.

The risk-to-the-data Vs. the-risk-in-the-data.

It is intuitively accepted that when securing or insuring a jewelry store the security expenses and the premiums would be related to the Carat value of the jewels in the store. A fake jewelry store may require a lock and key, while a Harry Winston type store will...
IT Risks and Insurance

IT Risks and Insurance

Insuring against IT risks in small and medium-sized (SME) organizations is becoming more important: The move to the cloud makes the employee endpoints the data hub. Employees download, process and upload data. Some data gets left on the endpoint and may get uploaded...