Blog

Blog

What is an Incident Response Plan (IRP)?

An incident response plan is defined as the documentation of a predetermined set of instructions or procedures to detect, respond to, and limit the consequences of malicious cyber-attacks or an organization’s information systems. In shorter, simpler terms, it’s the written plan your team has to respond to specific problems with your IT systems.

Read More »

3 Ways to Boost Your Security Using Identity and Access Management (IAM)

Haters may call it alphabet soup or too confusing to care about, but here at PTG, we’re pretty keen on all of our acronyms and what they represent. Not only are there dozens of terms to remember, making these shortened versions the perfect little helper, but writing PAM instead of things like Privileged Access Management over and over again saves time and space. It's our goal to simplify these complex topics into something a little more palatable- if you will.

 

Today’s alphabet soup is a hearty helping of security from your favorite chefs in the industry. Instead of harping on MFA and EDR or even PAM for your SMB, today our IT topic may be a little longer than a TL;DR but covers an equally important topic: IAM.

Read More »

The Small Business Guide to Cyber Insurance

Insurance can be a fickle thing.  

 

If you’re unlucky enough to be in a car accident, it can be as much of a life-saver as your seatbelt and airbag systems. But often, policies can feel redundant or over the top, like when you got that volcano insurance 

 

The reality is insurance is more than just coverage in the case of an accident or problem. And cyber insurance, in this volatile and uncertain internet age, is more of an answer to your concerns than you know. 

Read More »

Two-Factor vs. Multifactor Authentication: What's the Difference?

 

No matter the industry you’re in if you’re collecting information, you should be protecting that data. And to protect that data, you’ve undoubtedly run into phrases like single-factor, two-factor, and multifactor authentication – and the responsibilities that go come collecting all that data. In nearly every instance that breaches occur, the missteps can be boiled down to simple problems like weak credentials and poor security standards. (Go ahead and take the sticky notes with your passwords off of your computer monitor before you read the rest of this.)

Read More »

20 Cyber Insurance Questions That Can Help Lower Your Premium

 

Cyber Insurance protects one of the most important assets your company has- your data. With recent high-profile security incidents, requirements are tightening to qualify for reasonable cyber insurance premiums.

Use the questions below to prepare yourself for the questions you will encounter when applying for and renewing your cyber insurance.

Read More »
   
New Call-to-action

Posts by Topic

see all