Cybersecurity Tips + Vulnerability Alerts
Tips and Info for brokers and policyholders about specific cybersecurity threats.
Vulnerability and Threat Alerts
- Fortinet Vulnerability | January 2025
 - Cleo File Transfer Alert | December 2024
 - Pixel Advisory
 - Global IT Meltdown: CrowdStrike Software Update Causes Widespread Outages
 - CDK Global Incident | June 2024
 - Palo Alto GlobalProtect Vulnerability | April 2024
 - ScreenConnect Vulnerability | February 2024
 - Fortinet Fortigate Vulnerability Alert | February 2024
 - Confluence Data Center Vulnerability Alert | January 2024
 - GitLab Vulnerability Alert | January 2024
 - Jenkins Vulnerability Alert | January 2024
 - GoAnywhere Vulnerability Alert | January 2024
 - Ivanti Connect Secure Vulnerability Alert | January 2024
 - NetScaler Vulnerability Advisory | October 2023
 - Confluence Vulnerability Alert | October 2023
 - F5 BIG-IP Vulnerability Advisory | October 2023
 - Cisco ASA SSL-VPN Threat Alert | August 2023
 - Citrix Vulnerability Advisory | July 2023
 - Confluence Vulnerability Alert | July 2023
 - Adobe ColdFusion Vulnerability Alert | July 2023
 - MOVEit Vulnerabilities Alert | June 2023
 - Fortinet Fortigate Vulnerability Alert | June 2023
 - 3CX Desktop App Security Alert | March 2023
 - Phishing Campaign with Fake Extortion Demand
 - Banking Wire Fraud Alert | March 2023
 - Fortinet Vulnerability Alert | March 2023
 - Adobe ColdFusion Vulnerability Alert | March 2023
 - Jira Vulnerability Alert | February 2023
 - ESXi Ransomware Campaign | February 2023
 - FortiWeb Vulnerability Alert | February 2023
 - Zoho ManageEngine Vulnerability Alert | January 2023
 - Git Vulnerability Alert | January 2023
 - Control Web Panel Vulnerability Alert | January 2023
 
Cybersecurity Best Practices
- Mitigating Infostealer Malware
 - How do I select an MSP?
 - How to Leverage NIST CSF Version 1.1 at Your Organization
 - Security Controls For Cloud Based Organizations
 - How to Take Email Security to the Next Level
 - Zero Trust Network Access (ZTNA)
 - Common Vulnerabilities and Exposures (CVEs), Explained
 - Your Cyber Cheat Sheet
 - How to improve Your Cyber Risk Score
 - Multi-factor Authentication (MFA)
 - Resilient Backup Strategy
 - Endpoint Detection Response (EDR)
 - Securing Funds Transfers (Out-of-Band Authentication and Other Considerations)
 - Data Encryption
 - How to Respond to a Cyber Incident
 - Securing Email
 - Securing Access Controls
 - Vulnerability Management
 - Threat Detection
 - Securing Vendors
 - Internal Governance, Risk, and Compliance
 - HTTP Security Headers Best Practices
 - What is MFA Bypass and How to Prevent It
 - Securing Backups