Zinc Insurance
Zinc Insurance
  • Home
  • Blog
    • Cyber
    • Personal
    • Business
    • Insurance
  • News
  • Insurance
    • Zinc Group Healthcare
    • Medicare
    • Artists
    • Contractors
    • Home & Auto
    • Motorsports
    • Trucking
  • About
    • Team
  • Partners
  • Self Service
  • Contact
  • Request a Quote  
  • Home
  • Blog
    • Cyber
    • Personal
    • Business
    • Insurance
  • News
  • Insurance
    • Zinc Group Healthcare
    • Medicare
    • Artists
    • Contractors
    • Home & Auto
    • Motorsports
    • Trucking
  • About
    • Team
  • Partners
  • Self Service
  • Contact
  • Request a Quote  

Request a Quote

Red

  • Abstract art with different size spheres and network of lines, depicting complex coverage of cyber insurance

    Cyber

    May 5 2020
    Cyber in Isolation
    We’ve all known that paper files and Post-It notes weren’t going to cut it for much longer. But before Zoom became a household name, an IT department may have seemed more like a luxury than a necessity. As we all scrambled to adapt, technology has become an integral part of the workday for...
    Read More
  • Person using laptop who is at risk of others reading his personal data

    Cyber

    January 3 2019
    Cyber Security Alert: Your Network Device Is a Hacker’s Delight
    As the Internet of Things continues to grow, so do opportunities for devious hackers. A multi-national warning has been issued regarding our home and business network devices—think modems, WiFi routers, and repeaters. The Department of Homeland Security (DHS) has noted a large-scale attack launched against specific network devices. So together with the Federal Bureau of Investigation (FBI) and the United Kingdom’s National Cyber Security Centre (NCSC), they’ve issued a Technical Alert warning everyone about ongoing cyber exploitation.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    December 31 2018
    Cybercasing
    Far from Home Alone style, cybercasing brings crime into the 21st. Today’s criminals use your trusty devices against you. Tech-savvy bad guys let you do their work for them via geotagging, social media “check-ins,” and easily-identifiable features in posted pictures. Make a conscious choice to hold some key personal info close to the vest. That’s one simple way to protect yourself and those you love—case closed.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    June 1 2018
    Employment Phishing
    Hook, line, and sinker—phishing scams are always in season. And anywhere you’d hunt for jobs can be under attack. With disasters rendering thousands jobless, the basic need for employment could turn to desperation. That low ebb of emotion provides ideal phishing conditions. Wherever the compass points, phishers are trolling—don’t get hooked!
    Read More
  • Women gossiping depicting danger of social media overshare

    Cyber

    January 1 2018
    Social Media Overshare Fuels Identity Theft, Fraud, and Burglary
    Every year, millions worldwide are ravaged by identity theft, fraud, and burglaries facilitated by social media. How are criminals abusing social media? And how can we protect ourselves?
    Read More
  • Comic book woman falling in love with robot depicting cybersecurity risks of smart devices and technology

    Cyber

    October 31 2017
    The Icebox Cometh: Smart Home Tech’s Emerging Reality
    Every second of every day, we’re up- and downloading, streaming and liking. At times, that’s whether we know it or not. And this is especially true in the up-and-coming smart (read: automated) home arena. Although emerging consumer technologies are a wonder to behold, and even more fun to use, there are always associated risks. But we’re not out to gyp anyone’s fun bank. In fact, we’re ready to show that the wide and wonderful Internet of Things (IoT) can be useful, efficient, and a downright blast.
    Read More
  • Person shaking hands with fish coming out of a sleeve,depicting phishing scam that could be protected by cybersecurity policy

    Cyber

    March 1 2017
    Tax Season Phishing: Peak Time for Big Game
    If you follow our Facebook and Twitter feeds then you’ve got a leg up—you know all about the growing phishing epidemic. Well-worded emails from supposed IRS workers or company execs have mislead many a dutiful employee. We’ve warned about this scamming method in the past, and the widespread threat continues to morph.
    Read More
  • Two men working on laptops with light bulbs above heads connected by wire depicting cybersecurity culture

    Cyber

    October 20 2016
    Wiring the Workplace: Grounding Your Cyber Culture
    We’re in the home stretch, and 2016 sure was one for the record books, cybersecurity- and other-wise. We’ll spare you a play-by-play, but suffice it to say in the world of all things cyber, we’ve hit a whole ‘nother level. And the upward trend continues, with abundant predictions of threats and concerns looming over the upcoming year.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    July 1 2016
    WiFi Spoofing
    Wifi spoofing: Just as fake as your favorite late show parody, but day and night when it comes to comic relief. With a few tips under your belt and eyes wide open, you won’t let cyber criminals have the last laugh.
    Read More
  • Tug of war depicting opposing forces of privacy and safety in regards to data collection

    Cyber

    April 21 2016
    Cyber Tug of War—Win, Lose, or Draw?
    The opposing forces of privacy and safety are at it again. This time, it’s Apple v. The Feds—heels in the mud, each hoping for victory. On the sidelines, fans make known their stake in the game. But in this tug of war, maybe the real win is when both sides keep their jerseys clean.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    January 27 2016
    Whaling Attack
    whaling attack: Not your momma's attempt at lesson teaching, this maritime-inspired techie homophone will catch decision-makers by the worst surprise. Targeting C-suite and high-level end users, sneaky cybercriminals use carefully crafted emails to reel in a company's "big phish," gaining insider access to company jewels. Sounds like it’s time to drop anchor and chart a new course—toward protection.
    Read More
  • Person being overwhelmed by cybersecurity terms

    Cyber

    January 27 2016
    Annual Cybersecurity Update
    Another Year of What Seems Like So Much Cyberwocky
    One more 365, come and gone. Our hyperconnected lives keep us always on the lookout for the next update, the hottest feature, the latest trends for the new year. But then that's also just how we're wired. Yet while we love to leap ahead, a look back...
    Read More
  • Man and woman yelling into bullhorns at each other depicting civil war among executives and IT in regards to cyber security

    Cyber

    September 9 2015
    Opposites Distract: Successfully Confronting the IT / C-Suite Struggle
    For today's business, things have reached critical mass. Not only are we seeing data breaches at every turn, but we're also finding fractured camps at their root—'civil war' within an already raging 'cyber war.' If this sounds familiar, take heart—big problems, both real and perceived, can be worked through and neutralized. It comes down to communication, to going beyond department lines, and focusing on common goals. After all, we're talking about the success not just of a company, but of each and every member.
    Read More
  • Business man wearing gas mask using binoculars depicting cybersecurity awareness

    Cyber

    January 28 2015
    Offensive Cyber Defense
    As we round January’s corner into the new year, there’s so much to think about, from ambitious goals and adventurous plans, to lingering concerns. One thing’s for sure, with a slew of unprecedented data breaches, 2014 did what it could to keep cybersecurity on the brain. So whether it’s still taxing our nerves, or if we’re in transition, let’s build on what we know, get out in front, and leave this worry behind.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    January 28 2015
    Zombie
    Just as deadly as its cannibalistic sound-alike, infinitely sneakier. A compromised link in an infected chain of computers, a zombie loves to share the filth
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    October 24 2014
    Dictionary Attack
    A logophile tongue-lashing? Wishful thinking. This "dictionary" is the cyber bully's tool. Using automation, hackers systematically try every entry as a password, hoping you chose "puppy" or "daisies"—or dare we say, "password"—to secure your sensitive data. What to do?
    Read More
  • Business man hanging off ledge

    Cyber

    October 10 2014
    Leveraging Data Protection in the Face of Shifting Responsibility
    As a CEO or business owner, maintaining an efficient and secure business is your overarching duty. And contrary to common belief, executives’ responses to data security warnings walk the thin line between early detection and a full-scale breach. Livelihoods and reputations hang in the balance. So before a security breach wreaks havoc on your life’s work, take time out for a candid conversation about risk. Bring your ‘A’ game, include your team, and trust that together, we can pin down a comprehensive solution.
    Read More
  • Man dancing with letters "DYK?" in backgrounds standing for "Do You Know?"

    Cyber

    July 16 2014
    Watering Hole
    The cyber equivalent of your standard nature documentary scene, this shady strategy uses employees’ browsing habits against them, infecting oft-visited sites—like the local pizza joint you order lunch from every Friday—with malware.
    Read More

Stay Connected

Like Follow Follow Subscribe

Subscribe

Tags

Affordable Care Act Artist Insurance Auto Insurance Business Insurance Business Management Business Owners Contractors Cyber Insurance DYK Employee Fraud FAQ Finance Flood Insurance Healthcare Homeowners Insurance Information Security Insurance IoT Liability Insurance National Cyber Security Alliance Property Insurance Renters Insurance Retirement SAZ Small Business Tax Season The Gathering Place Trucking Umbrella Insurance
Like Follow Follow Subscribe
©2021 Zinc Privacy Policy Terms & Conditions