The Importance of Patches and Updates | CyberDot | Cyber Insurance

The Importance of Patches and Updates

Posted Posted in Education

Updating and patching are key parts of any security policy, whether you are a small business, a large business, or an individual. Patches resolve issues ranging from major to minor and ensure that you are using the latest version of the software available. Discover why patch and update management is so important, then explore the […]

Encryption (In Motion) | CyberDot

Encryption (In Motion)

Posted Posted in Education

When it comes to protecting the data related to your business, encryption in motion is crucial. Encryption hides the information stored within files. While encryption in motion focuses on data that are moving, encryption at rest focuses on stored data. Many of the best practices for encryption in motion overlap with those for encryption at […]

The Top 4 Cyber Liability Insurance Carriers | CyberDot | Cyber Insurance

The Top 4 Cyber Liability Insurance Carriers

Posted Posted in Education

In previous blog posts, we’ve talked a lot about what is cyber liability and the reasons why it is a must-have insurance policy for practically any business. Today, we will talk about the top 4 insurance carriers we represent that specialize in cyber liability. All these carriers have an excellent, A or A+, financial rating […]

What You Need to Know About Virtual Private Networks | CyberDot | Cyber Insurance

What You Need to Know About Virtual Private Networks

Posted Posted in Education

Among the various cybersecurity measures you should put in place to protect your business, using a virtual private network (VPN) is crucial. VPNs make it possible to connect remotely and securely to a private network. For example,  securely connecting to a corporate network while using a public one. When you use a virtual private network, […]

How to Secure Your Network Devices | CyberDot | Cyber Insurance

How to Secure Your Network Devices

Posted Posted in Education

Your network is only as secure as the least secure device connected to it. Whether that is a laptop, tablet, smartphone, or other Internet of Things device that you may overlook. Hackers have the skills necessary to use a device to access your network as a whole. This allows them to steal information, install malware, […]

Encryption (At Rest)

Encryption (At Rest)

Posted Posted in Education

Encryption at rest overlaps with encryption in motion but focuses on protecting the data that is at rest. Data at rest refers to the data that does not move, such as that stored on a laptop. By contrast, data in motion is the data moving through a network, such as via email. As such, the […]

The Importance of Cyber Liability Insurance | CyberDot | Cyber Insurance

The Importance of Cyber Liability Insurance

Posted Posted in Education

We’ve seen various highly publicized cyber breaches on the news lately. Despite all the media coverage and statistics showing an increased risk to fall victim to a cyber breach, many businesses do not have a cyber insurance policy. A research firm Ovum conducted a study in 2017 for a Silicon Valley analytics firm FICO and […]