Application Security

11:14 AM
Dark Reading
Dark Reading
Products and Releases

CyberScout Elite Brings Commercial Cyber Coverage to High Net Worth Households

Offering combines concierge service with a suite of commercial quality protective services and the convenience of a mobile app.

Providence, RI, and Scottsdale, AZ — Today CyberScout announced CyberScout Elite, the first cyber security service specifically designed to meet the security needs of high net worth households, combining concierge service with a suite of commercial quality protective services and the convenience of a mobile app.  Available through insurance companies, financial advisers, and family offices, CyberScout Elite protects the privacy, assets, and identities of high net worth individuals.

With their complex lifestyles and assets, high net worth households need a sophisticated approach to cybersecurity, similar to the coverage available to businesses. CyberScout Elite provides comprehensive protective services that anticipate risks while addressing identity theft and related threats.

Provided in partnership with insurance providers, financial advisers and family offices, this first-of-its-kind coverage includes:

· A mobile app for Android phones and iPhones which alerts to potential identity theft and risk while on-the-go.

· One-touch calling to CyberScout’s award-winning team of highly trained and experienced information security, fraud protection and remediation professionals, for immediate, personal and expert help and advice, 24/7.

· Continuous household protection that includes identity monitoring, breach management and ID theft response services.

· Support for everything from securing home network connections and privacy settings to addressing social media and reputational damage

Said Risa Pecoraro, CyberScout’s EVP, Research & Development, “CyberScout Elite minimizes customer risk through education and support, monitors for signs of identity theft across private and public databases, and heals the damage if identity theft occurs. It gives insurers specialized coverage for affluent subscribers, allows private bankers to extend secure practices to their high net worth clients’ households, and puts an umbrella of protection around family offices and their clients.”

CyberScout Elite is available immediately. 

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-07-17
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
PUBLISHED: 2018-07-17
In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.
PUBLISHED: 2018-07-17
An issue was discovered in XiaoCms X1 v20140305. There is a CSRF vulnerability to change the administrator account password via admin/index.php?c=index&a=my.
PUBLISHED: 2018-07-17
TeamViewer through 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between "[00 88] and "[00 00 00]" delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has ...
PUBLISHED: 2018-07-17
manager/editor/upload.php in joyplus-cms 1.6.0 allows arbitrary file upload because detection of a prohibited file extension simply sets the $errm value, and does not otherwise alter the flow of control. Consequently, one can upload and execute a .php file, a similar issue to CVE-2018-8766.