We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.
Why use encryption for my small business?
April 8, 2025
A Lesson About Small Business Encryption Small Business Encryption is a growing solution trend, particularly because it can easily be deployed and add a powerful layer of protection for your business. But what about yours? With all of the complex cybersecurity solutions out there, many believe most are not necessarily...
Louisiana Cybersecurity, Privacy & Data Security Law
March 30, 2025
Doin' business in the Bayou state? Review information here to get a handle on Louisiana Cybersecurity Privacy & Data Security Laws. Insurance Data Security Law (IDSL) The Insurance Data Security Law (IDSL). Act 283 (HB 614) of the 2020 Regular Session of the Louisiana Legislature, established the standards applicable to...
December 30, 2024
Alabama Data Security & Cyber Regulations are in place, and must be observed and practiced by businesses operating there. This is a summary of those regulations, and who must be complaint. Insurance Agency Regulations: Alabama Dept. Of Insurance Data Security Program Requirements Producers & Licensee Data Security Obligations Alabama Definition...
What is RMM? Cybersecurity Best Practices
October 22, 2024
In 2024, the word cybersecurity often leaves many of us feeling lost and afraid. Why? Because of the ever-growing reliance on tech in our personal and professional lives. For small to medium-sized businesses, this is an increasingly challenging area, as it feels like a massive expense for something you don’t...
Cyber Risk Assessments Don’t Have to Be Like a Root Canal
October 18, 2022
Cyber Risk Assessment can be fast, easy and painless If you’re like most business owners, a cyber risk assessment isn’t at the top of your to-do list. In fact, you may think it’s like a root canal — a painful process you’d rather avoid.But cyber risk assessments are not necessarily...
Proactive Agents Employ Cyber-Risk Assessments to Write More Business
July 29, 2022
Proactive Agents Employ Cyber-Risk Assessments to Write More Business A recent survey found that 82% of global insurers expect rises in cyber premiums to continue for 2 years, due to their inability to accurately understand a customer’s security posture. 87% of insurers "want a consistent approach to analyzing cyber risk,...
July 11, 2022
A Lesson from Ben Franklin on Cyber-Protection Ben Franklin is famous for pithy wisdom, and one of his most famous sayings is: “An ounce of prevention is worth a pound of cure.” In colonial America, the biggest threat to life and property, aside from disease, was the risk of fire,...
May 26, 2022
When does MFA require F2A? It's tough to find a cyber insurer today who does not require their insureds to deploy multi-factor authentication (aka MFA) across their organization. It’s a fairly well-understood concept to most agents that it's now a “No-MFA, No Play” game, and the absence of a positive...
TEKRiSQ named to 2022 CyberTech|X Cohort
January 19, 2022
2022 CyberTech|X Startup Accelerator Tampa Bay Wave's 2022 CyberTech|X Accelerator cohort kicked off this week, welcoming 15 of the best and brightest cybersecurity startups from across the US (including TEKRiSQ) and beyond to Tampa Bay. These include startups from Canada, France, Germany, Israel, and India. This cohort also includes four...
Business Owners Remain Overconfident About Cyber Threats
October 22, 2021
There is an issue we have seen time and time again - business owners do not understand or appreciate their cyber risk and they remain overconfident about their ransomware risks. According to a recent article citing an Embroker report published in Carrier Management, business owners remain” vastly overconfident about both...