Security & Risk Management

Evaluating, analyzing, and managing the risk and security

Cyber insurance wants to know…

A cyber-insurance company will have many questions to ask you before agreeing to write a policy.

Be smart and make sure your company has taken all these steps before you apply for insurance.

  • Do you have a perimeter firewall, which is the main defense in the perimeter of your network. Firewalls are needed to find intruders and alert the network about unwanted traffic and unwanted content. The best perimeter walls prevent incoming network traffic from entering areas where you want to limit traffic. They also divert outgoing traffic from reaching undesirable external networks.
  • Do you use anti-virus software that can block, isolate, repair or delete files infected by a virus. The software should have “signature detection” that studies the “digital signature” of a computer virus.
  • Does your staff use strong, complex passwords, and does your IT department regularly install software patches that address security concerns?
  • Do you periodically dispose of older hardware and software – both vulnerable entry points.
  • Have you encrypted any mobile devices that handle sensitive or regulated data?

Important to comply

These are just some of the concerns that insurance companies will discuss before writing you a policy.

Don’t cut corners or you may find yourself without coverage at the worst possible time.

Mark Wiener


Mark Wiener, CEO, BizCom Global has spent 30 years in the digital transformation industry even before it was a term.  Focusing on bringing together Operational productivity needs, Financial compatibility and IT standards and integration including security.  He works with companies from the halls of the fortune 500 down to the local mom and pop business focusing on how companies looking through the lens of a cloud first strategy can help achieve improved operational performance with planned and proper implementation of technology which include appropriate cybersecurity controls.

Mark prides himself on his ability to really listen to the customer, honestly assess their needs, and work relentlessly to assure the final solution exceeds the customer’s expectations.

Other Posts you might like...

Cyber Safety Travel Tips for Thanksgiving
Thanksgiving is the busiest travel weekend of the year in America! We here at BizCom Global want to make sure...
What makes a good cyber security pro?
Top-quality professionals in cyber security have always been hard to find.  If you’re in the market for one or more,...
Rating your cyber resilience
Preparation, detection, response, and recovery are the pillars of a successful cyber resilience program. These steps can keep your organization...
How cyber resilience works
Cyber resilience and cyber security may sound similar, but there’s a difference. Think of cyber security as the all-around approach...