South Dakota Cybersecurity Law

South Dakota Cybersecurity Laws South Dakota’s Senate Bill 62  represents South Dakota Cybersecurity Laws and forms the basis of further maturity in this area. The South Dakota Data Breach Notification Law was enacted in 2018 The law requires entities that conduct business in South Dakota owning or license computerized personal...

Counting on US Government Cybersecurity to Protect your Business?

Guess Again. Despite record high cybersecurity breaches, and 2024 cybercrime losses nearing $10T, many small & medium-sized businesses (SMBs) fail to establish cybersecurity best practices. There are many reasons why cybersecurity is a blind spot for SMBs, including beliefs in several convenient myths that remove all risk. One that we...

Are Today’s Interconnected Businesses Dependent on Blind Trust in Cyber Ecosystems? 

Unspoken Faith is No Longer an Option Nowadays, nearly every business is a digital business; that is, they leverage tech and engage with others digitally to operate the company. We live in digital ecosystems & have blind faith in that working well for everyone. What does that mean? In today's...

Auvik: TEKRiSQ Use Case

How TEKRiSQ uses Auvik SaaS Management to secure their customers’ usage of SaaS? Gain deeper business insights, provide faster customer assessments and tackle previously unseen risks with Auvik’s Automated SaaS Discovery About TEKRiSQ TEKRiSQ is a new kind of cybersecurity company that helps small & medium-sized businesses (SMBs) make critical...

Myths: Mac Misconceptions

Myths about MACs and cybersecurity best practices "We use Macs, so, y'know... we're pretty secure." We've heard this countless times during cyber risk assessments. There are many misconceptions and myths regarding cybersecurity best practices, and this is just one.  One of the more common myths is that MACs are immune...

CyberCertified Process

The TEKRISQ CyberCertfied process delivers a missing piece in cybersecurity insurance relationships... accountability.    When insuring a client for cybersecurity insurance (standalone Cyber, Tech E&O, etc) Its important to demonstrate accountability in the submission. The ability to provide all parties with access to information about the insured client is ideal,...