Radio Media

Complying with Cyber Liability Insurance

By Terry Cutler / March 17, 2024

If you assume your cyber insurance claim will sail through without scrutiny, think again. When evaluating your claim, your cyber insurance provider will assess whether you exercised “due care” in safeguarding your business against cyber threats. While possessing a cyber liability insurance policy is a must in today’s landscape, you cannot guarantee that your insurer…

Read More

A Deep Dive Into Data Governance

By Terry Cutler / March 15, 2024

Data is key to understanding customers, market trends, and internal business operations. Making the most of this information is crucial for improving customer experience, driving innovation, and enhancing overall productivity. You can unlock the full potential of your digital data with efficient data management and governance. Data management is all about organizing, securing, and sensibly retrieving…

Read More

Password best practices

By Terry Cutler / March 5, 2024

Those who know me know how I feel about password best practices. Password protection is imperative if you want to ramp up your cybersecurity.  With the business world heavily reliant on digitalization, using technology is unavoidable. Although technology can undeniably give your business an advantage in increasingly competitive markets, many troublesome areas exist to monitor. Setting…

Read More

Monitor, Test, Restore – Making Sure Your Backups Are Ready

By Terry Cutler / March 2, 2024

Backups play a critical role in any data protection strategy. However, if you depend entirely on your backups for disaster recovery and business continuity, unexpected backup failures can prove disastrous for your business. When backups are scheduled automatically, you risk falling victim to media failure, software issues, cyberattacks or even a simple human error. Fortunately, you…

Read More

Understanding Reputational Risk in Cybersecurity

By Terry Cutler / February 28, 2024

Following a cyber attack, brand reputation is a critical aspect of cybersecurity, often referred to as reputational risk.  This risk encompasses the potential threat to the integrity of a company’s name, the trust of its loyal customer base, and its historical standing within the market. It stands alongside other significant cyber threats, such as digital,…

Read More

Tangerine hacked: 230,000 customers exposed

By Terry Cutler / February 23, 2024

Tangerine, the latest company to be hacked in the Australian telecommunications sector, has unfortunately fallen victim to a significant data breach, wherein hackers managed to pilfer some personal information of an estimated 232,000 customers. The breach, which occurred on February 18, was brought to management’s attention on February 20, prompting Tangerine to notify affected individuals…

Read More

A Blueprint for SMBs to Thrive 

By Terry Cutler / February 21, 2024

Organizations worldwide have navigated a tumultuous journey, and small and medium-sized businesses (SMBs) have borne the brunt of the challenges.  Given their limited financial resources, setbacks for SMBs have been more pronounced than those of their larger counterparts. SMBs face heightened stakes and unique hurdles. In the face of global pandemics or even shifting market conditions,…

Read More

The Right Cyber Insurance Coverage

By Terry Cutler / February 18, 2024

Although adopting the latest technologies and industry trends is undoubtedly crucial, ensuring your business has the best cyber liability insurance is equally important. Think of it as an invisible shield protecting your business from devastating losses. However, to harness its full potential and ensure robust protection, it is critical to have a nuanced understanding of…

Read More

Top 4 Co-Managed Cybersecurity Myths

By Terry Cutler / February 13, 2024

As a business owner, you may need to choose between relying on your in-house cybersecurity staff or outsourcing technology management to a cybersecurity service provider. There is, however, a third option: co-managed cybersecurity. This approach combines the advantages and convenience of in-house cybersecurity competent and specialized support from outsourced specialists. Cybersecurity is a “best of both…

Read More

The Challenges of Network Monitoring

By Terry Cutler / February 12, 2024

Your network is your business’s lifeline. A healthy and secure network is critical for seamless communication and operational efficiency. That’s why it’s crucial to proactively identify issues and optimize performance through continuous network security monitoring. However, as you keep a close watch, you’ll discover many issues lurking beneath the surface. In this blog, we’ll look…

Read More