Enroll today by emailing [email protected]
EVOLVE’S CYBERSECURITY MOBILE APP
FREE FOR ALL POLICYHOLDERS
Evolve’s mobile app continually scans for cyber vulnerabilities facing your organization, and alerts you of new threats in real time. The insured can directly message cyber questions to our forensic experts, and even notify a claim directly in the app. Mobile App download instructions and walkthrough can be found here.
DARKTRACE
IDENTIFY & PREVENT CYBER ATTACKS
Darktrace’s artificially intelligent cybersecurity technology identifies & prevents cyber attacks on your organization in real time, autonomously shutting down hackers by monitoring your organization’s entire digital footprint, including data wherever it resides (cloud, SaaS, email, endpoints, IoT, & physical systems).
BLACKFOG
ON DEVICE RANSOMWARE PROTECTION
BlackFog’s data exfiltration prevention technology stops ransomware! See it for yourself in 7 days with a free ransomware assessment. After your trial meet with BlackFog’s VP of Threat Intelligence, an expert in cybersecurity investigations with a background in law enforcement who will analyze the findings and present you with your customized threat report. Don’t become the next Ransomware statistic, get started today!
Common Cyber Security Controls Explained
Multi-Factor Authentication (MFA)
Multi-factor authentication, is a method to protect access to corporate networks and business-critical systems, both on-premises and remotely. MFA can be used to secure remote access to the network, business email accounts, and privileged user accounts (e.g. IT admin accounts).
Phishing Training & Simulated Attacks
The simulated phishing emails may look like they are from a manager, vendor, or a well-known brand name. It is important to have phishing training because human error is the number one cause of cyber events.
Offline Backups
An offline backup is a copy of your data that is not stored on the same device as your original data and is not connected to the Internet.
Endpoint Detection & Response
Endpoint Detection and Response (EDR) is a solution that continuously monitors devices to detect and respond to cyber threats like ransomware and malware.
Network Monitoring Solution
A network monitoring solution continuously monitors and evaluates a computer network by identifying and remediating inadequate network components.
Computer System Updates & Critical Patches
Critical patch management is the process of applying updates to software. These patches are often necessary to correct errors, vulnerabilities, and bugs in the software.
Email Filtering Software
An email filter will filter incoming emails for spam, malware, and suspicious links. Malware, including ransomware, is often hidden within links or attachments, which lure employees to open them.