Quantcast
Channel: INSUREtrust
Browsing all 154 articles
Browse latest View live

Cyber Insurance Becomes A Real Need for Physicians’ Offices

Physicians Money Digest has published a new article on their website titled, “Cyber Insurance Becomes Necessity for Physicians’ Offices,” about the importance for physicians’ offices to carry cyber...

View Article



Breach Fatigue – What Is It?

An interesting report from Ponemon and RSA indicate that even after huge data breaches many consumers aren’t adjusting their behavior. Why? It comes down to a new term, coined “breach fatigue.” In the...

View Article

Anthem Breach

As you may have heard already, Anthem Inc., the second-largest healthcare insurer in the US, announced on Wednesday that it was cyber attacked. Medical and personally identifiable information (PII) of...

View Article

Law Firms Are Pressed on Security for Data

In 2011, the Federal Bureau of Investigation met with managing partners of top law firms in New York and other major American cities to discuss the problem of online security, especially for law firms...

View Article

Retail and Hospitality Industries Targeted by Cyber Thieves

Over the last couple of years, large breaches of major retailers such as Target, Home Depot, and Neiman Marcus have made it clear that the retail and hospitality industries are prime targets for cyber...

View Article


Data Destruction – Are You Prepared?

A hacker could come after your company’s data at any time. Are you prepared? Trying to recover from a digital attack can be very costly – including hiring computer forsenics experts to figure out...

View Article

Why SMBs Are Under Cyber Attack

Though corporate giants like Target, Anthem, and Home Depot get most of the media attention for cyber attacks, small and medium-sized businesses (SMBs) are actually more likely to be attacked.  Yes,...

View Article

Mobile Devices Pose Security Risks

Because smartphones and tablets are now ubiquitous, many companies have adopted “bring your own device” (BOYD) and “corporately owned, personally enabled” (COPE) policies to deal with their use in the...

View Article


Employee mistakes a big source of data breaches

When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by...

View Article


PCI Compliance

Merchants who want to use payment cards are subject to the rules of the payment card industry (PCI). The card-processing contract that a merchant must sign places the burden of proof on the merchant....

View Article

Cyber Extortion is Real and Can Be Catastrophic

Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing.  At risk in a digital extortion attack is not only a company’s...

View Article

Breach planning basics – Part 1

We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance,...

View Article

Breach planning basics – Part 2

In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP).  Among them were designating a member of management to be responsible for the IRP, and...

View Article


PCI and The C suite

Cyber security and pre breach planning need to be a priority of the C Suite.  Executives who think they can leave these issues solely to the IT team do so at their own peril The post PCI and The C...

View Article

Current Cyber Threats and Market Update

Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare,...

View Article


Physical Security is Vital to Defend Against Hacking

There are a lot of things that a business can do to from a digital standpoint to boost its IT security, and we’ve written repeatedly about some of these methods. But physical security of computer...

View Article

Overcoming Client Objections to Cyber Coverage – Part 1

“Cyber Liability… What is that, exactly? Do you mean data breach insurance? That has something to do with technology, right? Like, internet insurance?” These were some of the questions we saw in the...

View Article


Penetration Tests

To offer maximum value to our insureds and stand out from the competition, we as insurance professionals need to do more than just offer our clients good coverage. We also need to help them with the...

View Article

Directors and Officers On the Hook For Breach-Related Mismanagement

In response to a security breach in 2000 at the State Department, then Secretary of State Madeleine Albright told her staff, “I don’t care how skilled you are as a diplomat, how brilliant you may be...

View Article

The Intriguing Story of LabMD – Part 1

This is a rather different story of a cyber breach than what we usually write about. Instead of a company pitted against an unknown hacker whose identity will probably never be known, this one is...

View Article
Browsing all 154 articles
Browse latest View live




Latest Images