Cyber Insurance Becomes A Real Need for Physicians’ Offices
Physicians Money Digest has published a new article on their website titled, “Cyber Insurance Becomes Necessity for Physicians’ Offices,” about the importance for physicians’ offices to carry cyber...
View ArticleBreach Fatigue – What Is It?
An interesting report from Ponemon and RSA indicate that even after huge data breaches many consumers aren’t adjusting their behavior. Why? It comes down to a new term, coined “breach fatigue.” In the...
View ArticleAnthem Breach
As you may have heard already, Anthem Inc., the second-largest healthcare insurer in the US, announced on Wednesday that it was cyber attacked. Medical and personally identifiable information (PII) of...
View ArticleLaw Firms Are Pressed on Security for Data
In 2011, the Federal Bureau of Investigation met with managing partners of top law firms in New York and other major American cities to discuss the problem of online security, especially for law firms...
View ArticleRetail and Hospitality Industries Targeted by Cyber Thieves
Over the last couple of years, large breaches of major retailers such as Target, Home Depot, and Neiman Marcus have made it clear that the retail and hospitality industries are prime targets for cyber...
View ArticleData Destruction – Are You Prepared?
A hacker could come after your company’s data at any time. Are you prepared? Trying to recover from a digital attack can be very costly – including hiring computer forsenics experts to figure out...
View ArticleWhy SMBs Are Under Cyber Attack
Though corporate giants like Target, Anthem, and Home Depot get most of the media attention for cyber attacks, small and medium-sized businesses (SMBs) are actually more likely to be attacked. Yes,...
View ArticleMobile Devices Pose Security Risks
Because smartphones and tablets are now ubiquitous, many companies have adopted “bring your own device” (BOYD) and “corporately owned, personally enabled” (COPE) policies to deal with their use in the...
View ArticleEmployee mistakes a big source of data breaches
When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by...
View ArticlePCI Compliance
Merchants who want to use payment cards are subject to the rules of the payment card industry (PCI). The card-processing contract that a merchant must sign places the burden of proof on the merchant....
View ArticleCyber Extortion is Real and Can Be Catastrophic
Cyber extortion might sound like the stuff of a Hollywood script, but it is a reality that more and more businesses are facing. At risk in a digital extortion attack is not only a company’s...
View ArticleBreach planning basics – Part 1
We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance,...
View ArticleBreach planning basics – Part 2
In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP). Among them were designating a member of management to be responsible for the IRP, and...
View ArticlePCI and The C suite
Cyber security and pre breach planning need to be a priority of the C Suite. Executives who think they can leave these issues solely to the IT team do so at their own peril The post PCI and The C...
View ArticleCurrent Cyber Threats and Market Update
Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare,...
View ArticlePhysical Security is Vital to Defend Against Hacking
There are a lot of things that a business can do to from a digital standpoint to boost its IT security, and we’ve written repeatedly about some of these methods. But physical security of computer...
View ArticleOvercoming Client Objections to Cyber Coverage – Part 1
“Cyber Liability… What is that, exactly? Do you mean data breach insurance? That has something to do with technology, right? Like, internet insurance?” These were some of the questions we saw in the...
View ArticlePenetration Tests
To offer maximum value to our insureds and stand out from the competition, we as insurance professionals need to do more than just offer our clients good coverage. We also need to help them with the...
View ArticleDirectors and Officers On the Hook For Breach-Related Mismanagement
In response to a security breach in 2000 at the State Department, then Secretary of State Madeleine Albright told her staff, “I don’t care how skilled you are as a diplomat, how brilliant you may be...
View ArticleThe Intriguing Story of LabMD – Part 1
This is a rather different story of a cyber breach than what we usually write about. Instead of a company pitted against an unknown hacker whose identity will probably never be known, this one is...
View Article
More Pages to Explore .....