The Latest from Ethos

News & Resource Articles

Understanding Ransomware

July 12th, 2020 by Ethos Technologies

3D rendering of a reddish-orange metallic safe with a padlock on it, representing how ransomware locks your data from you.

Thirty years on from the world’s first cyber ransomware attack, cyber criminals continue holding organizations hostage, maliciously encrypting their file and demanding hefty ransoms for the safe return of the data. Indeed, while headlines come and go,...

Read Full Story »

Posted in: Cyber Security

Why Cyber Insurance Is Necessary

June 30th, 2020 by Ethos Technologies

A outstretched finger reaching for a holographic display that is displaying a shield with a padlock icon on it to represent cyber insurance.

Filing and Smiling When is the last time that you filed a piece of paper? It used to be that a file cabinet was like your personal bank vault – holding the papers that defined and valued a business. From employee records to bank statements, that file...

Read Full Story »

Posted in: Cyber Security

The Real Cost of Cyber Crime

June 17th, 2020 by Ethos Technologies

An outstretched finger touching a digital hologram on screen that is displaying a padlock icon, charts, and data to represent the cost of cybercrime.

What Happens If Your Computer Systems Are Hacked with Ransomware? I think I’m covered by my insurance policy for that…(pause)…you scramble and try to find your policy documentation. It’s here somewhere. I’m sure I’m covered…I mean, I think we’re covered....

Read Full Story »

Posted in: Cyber Security

A New Approach to Healthcare Cyber Security

June 7th, 2020 by Ethos Technologies

Closeup of a doctor sitting at a table  typing on a device, with multiple charts, icons, and graphics being displayed to represent healthcare cyber security.

A New Approach to an Old Problem Resistance to yet another government regulation, a lack of understanding the complexities of the rules, and an overall unwillingness to take on yet another area of expertise in an ever-changing technical landscape can...

Read Full Story »

Posted in: Cyber Security