Cybersecurity Insurance

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

A man in a suite stands with an umbrella as binary code rains down. The photo is a metaphor for Cybersecurity Insurance.

The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…

Risk Management

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…

Cloud Computing

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…

Network Integrity

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Cloud connecting to people in tech circles, network integrity

Network integrity starts with a network diagram. Actually, most things regarding technology risk should start with a network diagram. Your network is the circulatory, nervous and endocrine systems of your company. As such, it…