Skip to main content

Cybersecurity 101

New threats are always emerging. Our resources break down cybersecurity best practices to help better prepare for cyber threats.

Featured resources

Access helpful resources and the latest insights on emerging threats, cybersecurity best practices, and risk prevention techniques from Corvus by Travelers.

Explore all Cybersecurity 101

Cybersecurity 101

Navigating Business Continuity and Disaster Recovery

The actions you take in the first 48 hours of a business disruption set the stage for recovery. Our guide to BCDR can help get you started.

Cybersecurity 101

Best Practices for Managing Cyber Risks in Open-Source Software

Discover key strategies to mitigate cybersecurity risks in open-source software such as vetting standards, compliance, and the role of cyber insurance.

Cybersecurity 101

A Guide to Mitigating Infostealer Malware

Threat actors are increasingly using infostealer malware to infiltrate and exploit digital systems. Here's what you need to know.

Cybersecurity 101

Cyber and Construction: Laying Groundwork to Combat Digital Threats

The construction sector is facing urgent cybersecurity challenges. Learn more about unique risks and how creative underwriting solutions can help.

Cybersecurity 101

A Guide to Multi-factor Authentication (MFA)

What are the best practices to help your organization implement Multi-factor Authentication (MFA)? Learn more in this short cybersecurity blog.

Cybersecurity 101

Change Healthcare Hack: Everything You Need To Know

Change Healthcare experienced a ransomware attack with unprecedented fallout. What happened, and what have we learned?

Cybersecurity 101

Law Enforcement Can Help in a Cyber Crisis — But Prevention is Even Better

Law enforcement is thwarting threat actors on the dark web, but how can organizations lay a strong security foundation (with or without the FBI's help?).

Cybersecurity 101

Ransomware Groups Want to Exploit Your File Transfer Software

Now that the dust has settled on CL0P’s second big zero-day exploit this year, let's reflect on what happened and plan for similar attacks in the future.

Cybersecurity 101

Kickstarting Your Security Program: Leveraging NIST CSF Version 1.1

Looking to identify gaps in your existing program or mature your program? We’ll explore how CSF NST can help.

Cybersecurity 101

A Guide to Securing Access Controls

What are the best practices and resources to help secure access to your organization’s systems? Find out in this short cybersecurity blog.

Cybersecurity 101

How to Take Email Security to the Next Level

What are the best practices for email security? Find out how to boost your email infrastructure in this short cybersecurity blog.

Cybersecurity 101

A Guide to Data Encryption

What are the best practices and resources to help protect data across your organization? Find out about data encryption in this short cybersecurity blog!

Cybersecurity 101

A Guide to Threat Detection

What are the best practices and resources to help your organization detect cyber threats early and respond? Find out in this short cybersecurity blog!

Cybersecurity 101

Cyber Threats: 2022 in Review (& What to Expect from 2023)

With 2022 in the rearview, we’ll explore our successes in combatting risk and our concerns for the future. Learn more in this cyber blog.

Cybersecurity 101

Tracking Pixel Technology: Everything You Need to Know

What is pixel ad tracking technology and why is it involved in a plethora of class action lawsuits? Learn more about the problem with pixel.

Cybersecurity 101

A Guide to Zero Trust Network Access (ZTNA)

Find out how secure remote access methods such as ZTNA can help improve your cybersecurity program, applications, and services in this short cyber blog.

Cybersecurity 101

How to Respond to a Cyber Incident

What steps does Corvus recommend you take at each stage of cyber incident response? Find out in this short cybersecurity blog!

Cybersecurity 101

A Guide To Securing Email at Your Organization

What are the best practices and resources to help secure your organization’s email system? Find out in this short cybersecurity blog!

Cybersecurity 101

A Chilling Tale of How Data Exfiltration Attacks Happen

Learn about how data extortion attacks happen (and how you can prevent them) as we tell the story of Parakeet Inc. around our (theoretical) campfire.

Cybersecurity 101

Cyber Insurance Coverage & Terminology Guide

Expand your knowledge of cybersecurity best practices, threat actors, and data breaches to better understand cyber insurance policy terminology.

Cybersecurity 101

Cybersecurity Strategies for Small- and Medium-Sized Businesses

For too long, misconceptions about cyber risk have prevented serious mitigation efforts by SMBs. How are they catching up?

Cybersecurity 101

Small Businesses: How to Improve Your Security on a Budget

Good security is complex but achievable (even on a budget). Find out how to reduce the damage even the most innovative criminals can bring in this blog.

Cybersecurity 101

A Guide to HTTP Security Headers

HTTP Security Headers establish rules for browsers connecting to a web page. Learn about best practices for more secure browsing in this short cyber blog.

Cybersecurity 101

Cyber Risk, IT Tools & Ransomware Trends: Pre-Pandemic to 2021

In the wake of remote work and the rise of ransomware, how did the use of security tools, management, and preparedness vary across sectors?

Cybersecurity 101

The 3 Keys to a Successful Cyber Incident Response Strategy

An effective cyber incident response strategy requires a well-executed plan before and after an incident. Here are the 3 key steps to success.

Cybersecurity 101

The ABCs of 3-2-1 Backup Plans

We know ransomware is a major concern, and threat actors target backups to encrypt or delete them. Now what is a 3-2-1 backup plan, and how does it help?

Cybersecurity 101

Cyber Attack Analysis: The Latest on Kaseya and PrintNightmare

After a particularly busy week in the world of threat response, Corvus continues to monitor the Kaseya VSA situation and the PrintNightmare vulnerability.

Cybersecurity 101

Energy & Utilities Companies: Custom Reports Improve Cyber Hygiene

Colonial Pipeline is shocking, but hardly out of the blue given trends observed in the industry. Corvus’s free cybersecurity reports can help.

Cybersecurity 101

A Guide to Internal Governance, Risk, and Compliance

Learn more about best practices and resources to help your organization comply and develop common security policies and procedures in this cyber blog.

Cybersecurity 101

Best Practices for Securing Vendors

What are the Best practices and resources to help your organization address vendor security? Find out in this short cybersecurity blog.

Cybersecurity 101

Cyber Hygiene for Public Utilities: Why to Take Action Now, and How

If you’re a public utility supplying water, electricity, or natural gas to your community, we want to help. Learn more in this short cybersecurity blog.

Cybersecurity 101

Client Breach Response: The Impact of Capital One’s Legal Battle

In this blog, we sit down with Pasha Sternberg, an attorney at Polsinelli PC, to discuss the result of Capital One’s recent cyber breach legal battle.

Cybersecurity 101

BYOD: Does A Cyber Insurance Policy Cover Remote Workers?

What kind of cyber insurance policy does your business currently have, and does it cover newly remote workers? Learn more in this blog.

Cybersecurity 101

What Is Silent Cyber Risk?

What is Silent Cyber Risk, and what could it potentially mean for your clients? Find out in this short blog.

Expert insights tailored to your business

Every policy includes unlimited consultations with our Cyber Risk team, for insights on incident response strategies, security investments, and more.