Security

#
Okay, I have your attention with a flashy title and blast from the past with hamburger icon, Clara Peller, but it is important to share that we need to “beef up” the rhetoric to stop the desensitization to cyber crime. Businesses are dying. Heck, people are dying. Yes, people are dying because…
Read More >
#
River Run has provided you with this checklist to assist you in your review and discussions with your insurance company and broker regarding cyber security insurance.
Read More >
#
Buying cyber insurance can be daunting. And, renewing it at higher rates each year is no picnic either. Not only is there a lot of industry terminology, but understanding your coverages and how your company’s cybersecurity practices factor into the underwriting of your policy can be…
Read More >
#
In 2020, I was listening to Gary Vaynerchuk (aka Gary Vee) talk about Nonfungible Tokens (NFTs) and how he was looking to them as the “next big thing” since he has been picking big things for over two decades. After learning about blockchain and the world of cryptocurrency over the last two…
Read More >
#
The general rule everyone should continue to follow and share is, "If you are not sure something is a scam, assume that it is." The FBI released their Internet Crime Complaint Center (IC3) logs for 2020, and the data on scams and cybercrime is staggering.
Read More >
#
Sick of hearing about the rising tide of ransomware attacks? So is the RTF. The Institute for Science and Technology created the Ransomware Task Force (RTF) in December, drawing delegates from state, national and international government, law enforcement, cybersecurity insurance, security…
Read More >
#
 River Run received the following security update from ParkMobile this afternoon: "In March, ParkMobile, the developer of the MKE Park app, became aware of a cybersecurity incident linked to a vulnerability in a third-party software which we use. In response, we immediately launched an…
Read More >
#
We knew picking up after ourselves and being disciplined were keys to becoming a successful adult, even though a parent or older sibling may have had to bug us to get there. So why then are some companies avoiding MFA (Multi-Factor Authentication) as if someone in authority over us is asking us…
Read More >
#
Back in January, Microsoft was alerted about new Exchange vulnerabilities being exploited by hackers. Within a few days, multiple bad actors started exploiting these vulnerabilities. Security researchers discovered tens of thousands of attacks targeting businesses, around the world, which are…
Read More >
#
Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. The new 'work from anywhere world' makes everyone at risk to cyber attacks, especially because threats are even harder to track…
Read More >