Cybersecurity Tips + Vulnerability Alerts
Tips and Info for brokers and policyholders about specific cybersecurity threats.
Vulnerability and Threat Alerts
- Fortinet Vulnerability | January 2025
- Cleo File Transfer Alert | December 2024
- Pixel Advisory
- Global IT Meltdown: CrowdStrike Software Update Causes Widespread Outages
- CDK Global Incident | June 2024
- Palo Alto GlobalProtect Vulnerability | April 2024
- ScreenConnect Vulnerability | February 2024
- Fortinet Fortigate Vulnerability Alert | February 2024
- Confluence Data Center Vulnerability Alert | January 2024
- GitLab Vulnerability Alert | January 2024
- Jenkins Vulnerability Alert | January 2024
- GoAnywhere Vulnerability Alert | January 2024
- Ivanti Connect Secure Vulnerability Alert | January 2024
- NetScaler Vulnerability Advisory | October 2023
- Confluence Vulnerability Alert | October 2023
- F5 BIG-IP Vulnerability Advisory | October 2023
- Cisco ASA SSL-VPN Threat Alert | August 2023
- Citrix Vulnerability Advisory | July 2023
- Confluence Vulnerability Alert | July 2023
- Adobe ColdFusion Vulnerability Alert | July 2023
- MOVEit Vulnerabilities Alert | June 2023
- Fortinet Fortigate Vulnerability Alert | June 2023
- 3CX Desktop App Security Alert | March 2023
- Phishing Campaign with Fake Extortion Demand
- Banking Wire Fraud Alert | March 2023
- Fortinet Vulnerability Alert | March 2023
- Adobe ColdFusion Vulnerability Alert | March 2023
- Jira Vulnerability Alert | February 2023
- ESXi Ransomware Campaign | February 2023
- FortiWeb Vulnerability Alert | February 2023
- Zoho ManageEngine Vulnerability Alert | January 2023
- Git Vulnerability Alert | January 2023
- Control Web Panel Vulnerability Alert | January 2023
Cybersecurity Best Practices
- Mitigating Infostealer Malware
- How to Leverage NIST CSF Version 1.1 at Your Organization
- Security Controls For Cloud Based Organizations
- How to Take Email Security to the Next Level
- Zero Trust Network Access (ZTNA)
- Common Vulnerabilities and Exposures (CVEs), Explained
- Your Cyber Cheat Sheet
- How to improve Your Cyber Risk Score
- Multi-factor Authentication (MFA)
- Resilient Backup Strategy
- Endpoint Detection Response (EDR)
- Securing Funds Transfers (Out-of-Band Authentication and Other Considerations)
- Data Encryption
- How to Respond to a Cyber Incident
- Securing Email
- Securing Access Controls
- Vulnerability Management
- Threat Detection
- Securing Vendors
- Internal Governance, Risk, and Compliance
- HTTP Security Headers Best Practices
- What is MFA Bypass and How to Prevent It
- Securing Backups