Overwhelmed by a cybersecurity insurance audit and unsure how to meet all the requirements?

We will show you how our recently launched Cyber Security Initiative has been designed to help
organizations such as yours not only comply with insurance requirements but will also
help control the costs of your insurance.

Through experience and knowledge we use technology to simplify cyber insurance compliance.

Cyber Security Initiative allows you to:

ic-check-list

Continue business as usual without slowing down your daily operations.

ic-check-list

Have peace of mind knowing your organization is using best practices when it comes to cyber security.

ic-check-list

Implement an ongoing nonintrusive employee training platform to educate users how to prevent malicious parties from crippling and gaining access to your business critical assets.

ic-check-list

Develop infrastructure built for business continuity and resiliency.

ic-check-list

Keep Cyber Insurance costs affordable.

ic-check-list

Improve and ensure availability to network resources and data.

thumbnail

Multifactor Authentication

Multifactor authentication (MFA) is a security technology that requires multiple methods of authentication from independent categories of credentials to verify a user's identity for a login or other transaction. Most cyber insurance policies are requiring MFA to be implemented across an entire corporate network. Any place access can be gained whether internal or external must use MFA in order to gain access to the corporate network resources. Our Cyber Security Initiative deploys MFA and consistently maintains all MFA mechanisms to provide your organization secure access to your network and data. ...Read More

thumbnail

Endpoint Detection and Response

Cyber Insurance providers are requiring not only their clients have a valid AV/updated solution but the solution must have detection and response components included. If one of your endpoints becomes infected how is it detected and what response plan is in place to minimize any damage the threat could do. Our Managed (EDR) solution can be implemented quickly and this allows your organization to be compliant with any EDR requirements being imposed by your Cyber Insurance provider. ...Read More

thumbnail

Business Continuity Plan

Business continuity is an organization’s ability to maintain essential functions during and after a disaster has occurred. Although having good data backups is a component of a good BCP it is merely one of the puzzle. Cyber Insurance providers expect clients to have a full BCP that includes identifying recovery personnel, recovery procedure (detailing media types to ensure compatibility, systems involved and contact lists of personnel) and finally data backup. Your data backup plan should not be as simple as you have a backup to a USB drive every night. A solid BCP will include bare metal recovery and daily backup plans, onsite as well as offsite. CDS can implement a viable BCP so your organization knows what to expect in times of a disaster. ...Read More

thumbnail

Security as a Service

Having a firewall deployed is a good measure to take in protecting your business critical data. Once you have it in place what policies are in place to make sure it is updated with the most current firmware? A firewall is only as good as the latest firmware level it is running. If the firmware is out of date your network is vulnerable. Subscribing to SECaaS not only provides your organization with a Next Generation firewall but it also provides constant services to make sure your firewall is running the latest firmware, current configurations are backed up (this is allows for much faster recovery in the case the firewall goes down for any reason), troubleshooting and incident response, active monitoring for uptime, unlimited firewall changes and communication with your ISP in the case of an internet outage. All proactive and reactive elements of SECaaS are documented so that you know these tasks are being performed and you’re not just going off what you are being told. ...Read More

thumbnail

Vulnerability Scans

Periodic vulnerability scans will show an organization where better security measures need to be taken. Cyber Insurance providers like to see their their clients performing periodic vulnerability scans rather than jus taking the Ostrich approach to potential security holes. Performing vulnerability scans for our clients is a customary process and is considered best practice when securing an organization’s network. ...Read More

thumbnail

Employee Vulnerability Training

The weakest link to any organizations security is found within its employees. One cleverly created email to an unsuspecting employee can open up your organization to a world of chaos and trouble that will have an everlasting effect on your operations and bank account. By performing ongoing interactive training CDS can reduce chances of your network being compromised because of an employee’s decision to click on a link in a malicious email. ...Read More

thumbnail

Logging

A cybersecurity system that monitors your network can detect suspicious events and provide alerts to help eliminate threats before sensitive data is stolen or corrupted. Log monitoring is one of the most important ways to learn about potential threats and discover events that lead to a security breach. ...Read More

For more information 
on Cyber Security Initiative

Please complete the form below.