CYBERSECURITY: HOW TO EVALUATE ENDPOINT TECHNOLOGIES 

JOIN US FOR AN INSPIREYOU WEBINAR TO LEARN ABOUT ENDPOINT TECHNOLOGIES 

The pandemic has created new challenges for businesses that have adapted their operating model to include remote work. As technology becomes even more important in both our professional and personal lives, cybersecurity has become a top concern. What mitigation measures can you take to create a cyber-safe remote working environment? What steps can you take to make sure that employees working from various new locations do not pose a threat to your business and your data?  

Today, threats are increasing through endpoints—desktops, laptops, phones, servers, tablets and virtual environments—any digital item that is considered the “end point” of a network. This requires new security through endpoint protection. Join MJ Insurance for an InspireYOU webinar, Cybersecurity: How to Evaluate Endpoint Technologies on Tuesday, June 15th from 3:00 – 4:00 p.m. EDT to learn more about what endpoint technologies protect against and why it is important to have.  

Discover: 
  • What endpoint technologies entail and cover. 
  • How to assess your company’s need for endpoint detection and response. 
  • The variety of endpoint detection and response solutions. 
  • How to evaluate the endpoint protection options based on your needs. 

Carol Scully, MJ’s Strategic Risk Management Director will facilitate this informative webinar, which will include panelists Lauren Winchester, Vice President, Breach Response and Nate Smolenski, Chief Information Security Officer at Corvus Insurance.  

We look forward to your participation during this webinar and encourage you to invite any co-workers or friends you think could benefit from the information as well. 

REGISTER NOW