Tytanium Ideas

Computer screen with a fish hook surrounded by floating @ symbols.

When in Doubt…Don’t Become a Victim of Phishing Emails

According to phishing.org, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords. The information is then used to access important

When in Doubt…Don’t Become a Victim of Phishing Emails Read More »

Thousands of $100 bills going down the drain.

Data Breach Risk Management – The Cost of Doing Nothing

By Michael Greco of FUSE3 and Matt Oldham of Omnistruct Why should addressing cybersecurity compliance be a budgetary priority? Can a business get by doing the minimum needed and wait to invest more into their security posture later? Implementing a cybersecurity framework is about data breach risk management. Investing in cybersecurity compliance is similar to

Data Breach Risk Management – The Cost of Doing Nothing Read More »

Person retrieving verification code on phone to complete multi-factor authentication required to open an app on a laptop.

Multi-Factor Authentication and Cyber Liability Insurance – You Can’t Have One Without the Other!

Multi-factor Authentication (MFA) has been making headlines this year. Although MFA methods are not new on the scene, their use is now a requirement for most Cyber Liability Insurance policies. Due to unrelenting losses from breach and ransomware attack claims, insurance carriers have been forced to drastically change new policy requirements, including double authentication. Why

Multi-Factor Authentication and Cyber Liability Insurance – You Can’t Have One Without the Other! Read More »