South Dakota Cybersecurity Law
March 31, 2025
South Dakota Cybersecurity Laws South Dakota’s Senate Bill 62 represents South Dakota Cybersecurity Laws and forms the basis of further maturity in this area. The South Dakota Data Breach Notification Law was enacted in 2018 The law requires entities that conduct business in South Dakota owning or license computerized personal...
Counting on US Government Cybersecurity to Protect your Business?
March 4, 2025
Guess Again. Despite record high cybersecurity breaches, and 2024 cybercrime losses nearing $10T, many small & medium-sized businesses (SMBs) fail to establish cybersecurity best practices. There are many reasons why cybersecurity is a blind spot for SMBs, including beliefs in several convenient myths that remove all risk. One that we...
Are Today’s Interconnected Businesses Dependent on Blind Trust in Cyber Ecosystems?
January 7, 2025
Unspoken Faith is No Longer an Option Nowadays, nearly every business is a digital business; that is, they leverage tech and engage with others digitally to operate the company. We live in digital ecosystems & have blind faith in that working well for everyone. What does that mean? In today's...
November 25, 2024
How TEKRiSQ uses Auvik SaaS Management to secure their customers’ usage of SaaS? Gain deeper business insights, provide faster customer assessments and tackle previously unseen risks with Auvik’s Automated SaaS Discovery About TEKRiSQ TEKRiSQ is a new kind of cybersecurity company that helps small & medium-sized businesses (SMBs) make critical...
September 16, 2024
Myths about MACs and cybersecurity best practices "We use Macs, so, y'know... we're pretty secure." We've heard this countless times during cyber risk assessments. There are many misconceptions and myths regarding cybersecurity best practices, and this is just one. One of the more common myths is that MACs are immune...
December 4, 2023
The TEKRISQ CyberCertfied process delivers a missing piece in cybersecurity insurance relationships... accountability. When insuring a client for cybersecurity insurance (standalone Cyber, Tech E&O, etc) Its important to demonstrate accountability in the submission. The ability to provide all parties with access to information about the insured client is ideal,...