- Multi-Factor Authentication (MFA) for all remote access and privileged accounts
- Endpoint Detection and Response (EDR) or Antivirus on all endpoints
- Firewall and Intrusion
- Detection/Prevention Systems (IDS/IPS)
- Regular patch management and software updates
- Data encryption at rest and in transit
- Secure backups (offline or immutable) with tested recovery plans
- Email filtering and anti-phishing tools
- Documented cybersecurity policies and procedures
- Incident response plan (tested annually)
- Third-party/vendor risk management
- Asset inventory (hardware and software)
- Regular risk assessments and audits
- Ongoing security awareness training
- Phishing simulations and reporting
- Clear acceptable use and password policies
- Designated Incident Response Team (IRT)
- Incident logs and forensic tools
- Relationship with a breach response firm or MSP (some insurers require this)
- Cyber Warranty vs Cyber Insurance: Comparison Guide
- The Corkinc Cyber Warranty Vs Cyber Insurance Policy in protection against cyber risks
- Employee is tricked (or mistaken) into sending money to a fraudulent third party
- What is a Cyber Warranty
- Who Provides Cyber Insurance in Canada
- Annual Cyber Insurance Questionnaire (SMB Version – Canada)
- Cyber Insurance Claim Readiness Checklist for SMB Clients (Canada)
- Cork cyber warranty and can it purchased by End User