Validation rules are an important tool in a Salesforce admin’s toolbox to help ensure your precious data stays as clean as possible. Validation rules can be difficult to wrap your head around, but this article provides some tips that may make using this important functionality a little easier.
Downloading and verifying that a file hasn’t been inadvertently or maliciously changed has been the job of admins for a while. Ideally, to make sure the file you have downloaded is exactly the same as the source, you would make a byte-to-byte comparison. But that’s not often practical or possible for files you’ve downloaded.
Additionally, that just proves the file you downloaded was the...
Cyber criminals have the world at their fingertips thanks to the technology we use every day. But as consumers and business users become more informed, especially through the growing prevalance of Security Awareness Training Programs, the "easy" and well-known scam tactics of years past are becoming less effective.
Salesforce reporting has some amazing capabilities. With just a few clicks we can see our key accounts with open opportunities, our leads with upcoming activities due, and our contacts with recent call logs. These are all-inclusive asks and can be run fairly intuitively. But, sometimes we’re looking for what’s NOT there – and for this, knowing how to make use of cross filters in Salesforce...
Data breaches and subsequent identity theft are unfortunate but common occurrences today and have only increased since the onset of the pandemic.
Is the network perimeter dead, or just distributed?
In the earliest days of digital networking, organizations used firewalls as a boundary wall between an organization and the outside risks posed by the internet. It was a security framework that worked well at first — so well, in fact, that the perimeter-first ideology has persisted even to this day, despite the evidence that this approach is no...
Cybersecurity is complex and constantly changing, so as the threats continue to rise, you may wonder, "whose responsibility is cybersecurity?"
A ‘Compliance First’ Mindset Limits Liabilities for Organizations Like Yours
By adopting a Compliance First strategy when choosing solutions and vendors, you can identify those that do not comply with your requirements & eliminate them in order to be prepared for your cyber insurance questionnaires. It also means evaluating your current solutions and vendors and replacing those that cannot...
If you think that your cybersecurity insurance claim will be cleared with no questions asked, think again. While reviewing your claim, your cyber insurance provider will assess whether you took “due care” to protect your business from being compromised by a cyberattack. While having a cyber liability insurance policy is non-negotiable today, you cannot be fully assured that your insurer will...
Like other insurance models, cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for a type of loss. In the case of cyber liability insurance, this type of loss would include the impact of data breaches and cyberattacks. In this article, we'll cover the top-asked questions about cyber insurance and some expert tips for getting the right...
Cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for the impact of data breaches and cyberattacks. In recent years, cyber insurance brokerages have begun to recognize that security controls which reduce risk and liability are foundational to every organization's security posture.
Nothing is more powerful and important for an organization to be successful than communication. There are many tools for a business to choose from, such as Zoom or Slack, but in our professional opinion, Microsoft Teams is the ultimate business collaboration tool. Microsoft Teams isn’t just for meetings, calls, and chats; it’s a powerhouse tool that integrates with other productivity tools, like...
When applying for cybersecurity insurance this year, many organizations were surprised by new protocols during the security interview. What is causing this, and what are some of the new changes to cyber insurance renewals to be on the lookout for? Here's what we've found.
Rising Cybersecurity Incidents
After the COVID-19 pandemic began, organizations have seen an increase in cyberattacks due...
Clients have been engaging our team for assistance with cybersecurity insurance renewals with increased frequency, which has raised the question: Why? Is it that...