<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

VIDEO: Remote Workforce Roundtable Interview with Randy Scadden

You can read more articles about remote access and cybersecurity risks here.

As always, Datashield strives to be a leader in thought and innovator in the managed cybersecurity space. If you have any questions about how to secure your business during this time, make sure to contact us for a no-cost remote security consultation.

Topics from this Article

Proofpoint, Endpoint Detection and Response, Email Security, Video, Remote Access, Remote Users

Chris Vincent
Chris Vincent
Chris Heads up Marketing, Demand Generation and Martech at Datashield. He contributes to the Datashield resource library, hosts Datashield's flagship podcast "The Hash-Time Show" and manages Datashield video content.

Related Posts

Strong Showing For Datashield Partners In 2021 Gartner Magic Quadrant

With a clear separation in the market among the considered vendors, the newest Gartner Magic Quadrant for EPP, showcases 4 Datashield partners who are leading in this space.

How Datashield and ExtraHop Work Together

Learn how Datashield partners with ExtraHop, our premier Network Detection and Response (NDR) partner, from our Director of Product Management Mike Heller. I first met the ExtraHop team at RSA Conference 2020, just weeks before the world changed from COVID-19. After the initial meet and greets, we decided to schedule a time to do a deep dive post-conference. Datashield saw an immediate value-add that our service would bring from a technology perspective.

What is Cyber Insurance?

Statistics show that the fallout from successful cybersecurity incidents has both financial and business-related consequences. A data breach costs the average enterprises approximately $60,000, and in extreme situations, small and medium-sized businesses may go out of business within 6 months from the date the incident occurred. Thus, to determine whether the financial cost of successful hacking attempts, businesses have turned to insurance to deal with extensive losses.