Tytanium Ideas

“You Got No Idea What Suffering Is.” Ransomware is No Joke

To quote character Tom Mullen in the 1996 film Ransom, “You got no idea what suffering is.” When it comes to a breach, ransomware tops the list of the most damaging cyberattacks. According to IBM’s 2021 Cost of a Data Breach Report, last year, the total average cost to an organization of a ransomware attack …

“You Got No Idea What Suffering Is.” Ransomware is No Joke Read More »

Computer screen with a fish hook surrounded by floating @ symbols.

When in Doubt…Don’t Become a Victim of Phishing

According to phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important …

When in Doubt…Don’t Become a Victim of Phishing Read More »

Thousands of $100 bills going down the drain.

Data Breach Risk Management – The Cost of Doing Nothing

By Michael Greco of FUSE3 and Matt Oldham of Omnistruct Why should addressing cybersecurity compliance be a budgetary priority? Can a business get by doing the minimum needed and wait to invest more into their security posture later? Implementing a cybersecurity framework is about risk management. Investing in cybersecurity compliance is similar to purchasing insurance. …

Data Breach Risk Management – The Cost of Doing Nothing Read More »

Person retrieving verification code on phone to complete multi-factor authentication required to open an app on a laptop.

Multi-Factor Authentication and Cyber Liability Insurance – You Can’t Have One Without the Other!

Multi-factor Authentication (MFA) has been making headlines this year. Although MFA methods are not new on the scene, their use is now a requirement for most Cyber Liability Insurance policies. Due to unrelenting losses from breach and ransomware attack claims, insurance carriers have been forced to drastically change new policy requirements, including double authentication. Why …

Multi-Factor Authentication and Cyber Liability Insurance – You Can’t Have One Without the Other! Read More »

The words Sensitive Information shown over a computer circuit board.

We Are All Stewards of Sensitive Information

By Michael Greco and Matt Oldham of Omnistruct The sensitive information your company handles comes with a responsibility that you must not take lightly. Consider how you approach protecting your personal information, such as your bank account number, PIN, or social security number, and apply that same attitude towards your employee and customer data. When …

We Are All Stewards of Sensitive Information Read More »

How Much Cyber Liability Insurance Do You Need?

Cyber events are incredibly costly. A staggering 60% of businesses fail within six months of a data breach. According to Cybercrime Magazine, cybercrime will cost the world $10.5 Trillion annually by 2025. In 2020, the average total cost of a data breach was $8.6 million.  With threats such as Ransomware, Business Email Compromise, Phishing, and …

How Much Cyber Liability Insurance Do You Need? Read More »

3D laptop with cybersecurity shield.

What is Cyber Liability Insurance and Do You Need It?

Insurance coverage that protects small businesses from cyberattacks goes by many names: Cyber Insurance, Cyber Security Insurance, Cyber Liability Insurance, Cyber Risk Insurance, Cyber Attack Insurance, Cyber and Data Insurance, and the list continues. But what exactly is Cyber Liability Insurance, what does it cover, and does your business need it? This article will address …

What is Cyber Liability Insurance and Do You Need It? Read More »

3D laptop with cybersecurity shield.

What Should Cybersecurity Compliance Look Like for Your Company?

By Michael Greco and Matt Oldham of Omnistruct When it comes to cybersecurity compliance, proactive is far better than reactive. With the myriad of cyber threats businesses face daily, you can’t afford to be complacent. Finding and implementing a security framework that works for your business is crucial. Making one-off security changes when forced to …

What Should Cybersecurity Compliance Look Like for Your Company? Read More »

IT Asset Management – Understanding Hardware Lifecycle Stages

An IT asset’s lifecycle encompasses everything that occurs from initial determination of need to eventually disposing of the asset after it is no longer useful. Assets such as PCs, Laptops, Servers, Printers, Scanners, etc. are considered IT hardware. IT Asset Management (ITAM) allows businesses to optimize the useful lives of their assets and get the …

IT Asset Management – Understanding Hardware Lifecycle Stages Read More »

Get-Started-button