fbpx

Category Tag: Manage Risk

Graphic depicting security awareness training.

Security Awareness Training: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24522" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is security awareness training? Why is security awareness training effective? Who needs security awareness training?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I implement security…

Tech Firms & Bug Bounty Hunters: Where does your liability end?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24699" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How am I liable? What can I do about it?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] The last few years have seen the rise of bug bounty hunters:…

Encryption Basics: What is it, Best Practices, & More

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24591" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]What is encryption? Why is encryption effective? What's "data at rest" and "data in transit"?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]How do I protect data at…

Multi-Factor Authentication: Why Passwords Aren’t Enough Anymore

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="25052" img_size="full" alignment="center"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]Why aren't passwords enough? What's multi-factor authentication? Why is MFA effective? What's 2FA?[/vc_column_text][/vc_column_inner][vc_column_inner width="1/2" offset="vc_col-xs-6"][vc_column_text]When should I use MFA? How do I…

May Contain Traces of Log4j: Risk Management Strategies for Tech Firms

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="24603" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] It’s only been a month and experts are already calling the Log4j vulnerability one of the greatest security disasters of our time. Given the…

Graphic of tips for preventing ransomware

Prepare Now or Pay Later: How Can Businesses Mitigate the Risk of Ransomware?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21078" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_column_text] The pandemic and ensuing digital revolution has fuelled an outbreak of ransomware in recent years, a malicious software that infiltrates systems, encrypts data, and…

Graphic of ransomware attacks

Ransomware: Should You Pay Up?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column offset="vc_hidden-lg vc_hidden-md vc_hidden-sm"][vc_single_image image="21048" img_size="full"][/vc_column][/vc_row][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2"][vc_row_inner][vc_column_inner][vc_column_text]How do attackers get you to pay? What are the consequences? Should you pay up? How do insurance companies respond?[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_column_text] When it comes to ransomware,…

How Can Healthcare Professionals Manage the Risks of Virtual Care?

[vc_section][vc_row equal_height="yes" content_placement="middle"][vc_column width="1/2" css=".vc_custom_1703866902895{margin-top: 0px !important;margin-bottom: 0px !important;}" offset="vc_hidden-xs"][vc_column_text]What is virtual care? What are the challenges of virtual care? Best Practices for Healthcare Professionals   The COVID-19 pandemic has led to a surge in…

Graphic of the PROLINK Cloud insights statistics white paper

The Cloud: Not Just a Place to Daydream Anymore

[vc_section][vc_row equal_height="yes" content_placement="middle" css=".vc_custom_1588095456394{padding-top: 5% !important;padding-bottom: 5% !important;}"][vc_column width="1/2"][vc_column_text] While iterations of the cloud have been around for many years, it’s only recently that businesses have fully begun to embrace its computing potential. But, is…




    Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits


      Personal InsuranceCommercial EnterpriseAssociations & Affinity GroupsLife & Benefits

      Generic filters
      Exact matches only