What is RMM? Cybersecurity Best Practices

 In 2024, the word cybersecurity often leaves many of us feeling lost and afraid. Why? Because of the ever-growing reliance on tech in our personal and professional lives. For small to medium-sized businesses, this is an increasingly challenging area, as it feels like a massive expense for something you don’t...

Cyber Risk Assessments Don’t Have to Be Like a Root Canal

Cyber-Risk Assessments Don’t Have to Be Like a Root Canal If you’re like most business owners, a cyber-risk assessment isn’t at the top of your to-do list. In fact, you may think it’s like a root canal — a painful process you’d rather avoid. Unfortunately, many cyber-consulting firms make these...

Proactive Agents Employ Cyber-Risk Assessments to Write More Business

Proactive Agents Employ Cyber-Risk Assessments to Write More Business A recent survey found that 82% of global insurers expect rises in cyber premiums to continue for 2 years, due to their inability to accurately understand a customer’s security posture. 87% of insurers "want a consistent approach to analyzing cyber risk,...

BEN FRANKLIN: Cyber visionary

A Lesson from Ben Franklin on Cyber-Protection Ben Franklin is famous for pithy wisdom, and one of his most famous sayings is: “An ounce of prevention is worth a pound of cure.” In colonial America, the biggest threat to life and property, aside from disease, was the risk of fire,...

When does MFA require F2A?

When does MFA require F2A? It's tough to find a cyber insurer today who does not require their insureds to deploy multi-factor authentication (aka MFA) across their organization. It’s a fairly well-understood concept to most agents that it's now a “No-MFA, No Play” game, and the absence of a positive...

808 Podcast Hosts TEKRiSQ’s Bill Haber

808 Podcast: Bill Haber of TEKRiSQ spells out cyber risk in 8 minutes, 8 seconds   https://808podcast.com/808-podcasts/310-bill-haber-tekrisq-2/

Alabama Data Breach Law

Insurance Agency Regulations: Alabama Dept. Of Insurance Data Security Program Requirements Producers & Licensee Data Security Obligations Alabama Definition of Information Security Program (more…)

Louisiana Data Breach Law

Insurance Agency Regulations: Louisiana Dept. Of Insurance Data Security Program Requirements Producers & Licensee Data Security Obligations (more…)

Business Owners Remain Overconfident About Cyber Threats

There is an issue we have seen time and time again - business owners do not understand or appreciate their cyber risk and they remain overconfident about their ransomware risks.   According to a recent article citing an Embroker report published in Carrier Management, business owners remain” vastly overconfident about both...

Property Casualty 360: TEKRiSQ’s 5 Myths About Insuring Cyber Risks

Do you know these five myths about insuring cyber risks? By Dean Mechlowitz | October 07, 2021 at 12:00 AM Independent agents and brokers serving small and medium-sized businesses (SMBs) must keep up with twists and turns in cyber risk and cyber insurance. If they don’t, their clients and prospects can turn to “do it yourself”...