Category Business Vault

Cyber Insurance Terms Debunked

When working with clients to submit applications for Cyber Insurance, we often hear that they don’t understand the terminology on the application form. For anyone who has found themselves in this situation, hopefully these simplified explanations will help: IT Security Audit …

The True Cost of Poor IT Support

No one is exempt from IT problems, but it’s hard to put a dollar figure to the actual hard costs to your business when IT problems occur. That’s because so many of these issues happen randomly and can be difficult…

Why Bother with Cyber Insurance?

We continue to alert our clients about the increasing need for cyber insurance. Especially when we continue to hear that one of the largest cyber liability insurers Lloyd’s continues to limit coverage—right at a time when nation states are ramping up…

The Cyber Company that Cried Wolf

Sometimes I feel like the little boy who cried wolf, especially when it comes to the latest cyber attacks and breaches.  Do people really comprehend the ramifications if they were to personally get breached? Even worse if they were the…

An AI Wrote this blog

We decided to sit down and ask ChatGPT to write a blog on its threat to cyber security. ChatGPT:             (Note that the first thing it does is defend itself): As an AI-powered language model, ChatGPT is not inherently a threat…

Are You Hacked But Don’t Know It Yet?

I recently had the privilege of meeting a business analyst from BDC. She shared some not-yet published information from a study BDC conducted. Most statics available online are U.S. Obtaining Canadian statistics can be difficult so I appreciate her willingness to share…

We Interrupt This Program…

There are many sites that track current vulnerabilities in the world of cyber warfare. However, this one is severe enough to share with our readers: There is a vulnerability where, in simplified terms, a bad guy can send you an email…

What is a Tabletop Exercise (TTX)?

A tabletop exercise (TTX) is a method to test the effectiveness of a cyber incident response plan (IRP) by simulating a cyber breach. To be most effective, it involves executives from all areas of the organization in conjunction with the cyber…