Level up your Security

Our Security Journey: Zero to One

Hacks, breaches, ransomeware and cyber bullying- buzz words we see everyday in the news, on social media and in those persistent corporate awareness emails. We know we need to safeguard our personal information but at what cost? Its overwhelming to think about the different ways someone can hack our info online. Most of us think along the lines of, “why would anyone want my info- they can have it!”.

Cyber criminals are not always after the wealthiest or the highest ranking people, they’re looking for low hanging fruit.

Our motto here: Don’t be the low hanging fruit.

I am not a computer scientist, software engineer, or professional coder. Up until recently, I never understood cybersecurity practices beyond the superficial. Now i’ve plunged in with both feet. As a professional risk manager (insurance person) I have extensive experience in strategies that help us mitigate risk. I know that mitigating cyber risk does not always mean safeguarding myself to the level of the Pentagon but how I would and should safeguard my home and valuables.

In 100+ hours of study between Cyber insurance and Cybersecurity, I’ve learned that cybercriminals can mimic real life criminals. They can be simple- just opportunistic, looking for easy access. Lets make sure we set up the basics to keep our digital lives secure.

Get all the Guides for Free:

Survival Guide Volume I – Secure our Accounts

Next up:

Survival Guide Volume II – Secure our Devices

Survival Guide Volume III– Take back your Data