The cyber security insurance landscape is always shifting, with new requirements for businesses to have in place popping up regularly. Join Bob Pacheco of Mission Cyber Group and Tricia King of Vertikal6 as they discuss what businesses need to know about cyber...
Blog
Top Questions to Ask to Ensure Your IT Investments Make the Most Impact
This month, we feature a blog post from Phil Alberta of Next Phase Consulting! IT is the heartbeat of your company. It runs your operations, services your customers, and enables your employees. So how can you be sure the IT you have is bringing you the most value?...
How to Protect Your Company from a Cyberattack, Part 5: Data Governance and Protection
Greetings, loyal readers—and first-time blog visitors, too! This is our once-monthly blog column covering the key aspects of protecting your company and its data from the bad cyber actors out there (and by bad cyber actors, I mean hackers and other cybercriminals, not...
Your Cyber Insurance Questions Answered! An Interview with Brian Mahon
After our blog post earlier in the month introducing cyber security insurance to our readers, we had quite a response—many readers reached out to us with questions or asked for next steps and to point them to some more resources on the topic. So, we figured we’d call...
How to Protect Your Company from a Cyberattack, Part 4: Cyber Security Insurance
Welcome to another installment in the Mission Cyber Group blog series on protecting yourself from cyberattacks! Last month, we talked about the importance of having security policies and governance in place at your business, and how doing so can lessen the impact of a...
How to Protect Your Company from a Cyberattack, Part 3: Policies and Security Governance
Wait! Don’t click to a new page just because we said “policies” and “governance” in the title. If your reaction to talk of more policies and paperwork is to roll your eyes, believe us—we get it. But what if we told you—and here we’re doing our best impression of a...
How to Protect Your Company from a Cyberattack, Part 2: Social Engineering Training
Welcome to part two of our blog series on protecting your business from a cyberattack! Last month we discussed the first step in securing your company, which is doing a security assessment and getting a lay of the land when it comes to where your defenses currently...
LEGAL OBLIGATIONS FOR PRE AND POST-CYBERATTACKS
When it comes to data breaches, risk assessment requirements haven't changed over the years, because the risk itself to an organization has not changed. More often than not, the risk has proven to be a gateway for ransomware to remove an organization's data control...
MISSION CYBER GROUP PARTNERS WITH KNOWBE4 TO OFFER CUSTOMERS THE BEST IN SECURITY AWARENESS AND TRAINING
MCG Clients can Upgrade their Defenses Against Phishing Attacks with Automated, Scalable Tools and a Vast Library of Engaging Content CHADDS FORD, Pa., March 29, 2022 — Mission Cyber Group (MCG), a leading team of cybersecurity experts offering strategic advice...
How to Protect Your Company from a Cyberattack, Part 1: Security Assessment
Welcome to the first installment of a Mission Cyber Group blog series on protecting your business from a cyberattack. There are many ways your business and its data can be under threat, and as many ways to be protected from them, so in each blog we’ll dive into one...