But, the Data was Encrypted... | California Data Breach Notification Law Amendment

Posted by Jon Edwards on Nov 22, 2016 2:52:03 PM

Back in May 2016 I posted a blog (Be Prepared – Data Breach Notification Laws are Changing), which covered how data breach notification laws were evolving.  At that time the state of Tennessee amended its law, becoming the first state in the nation to require notification of any data breach, whether the information is encrypted or not.  I also predicted that state laws would most likely become stricter in the not too distant future…

Read More

Topics: Breach of Security, California Data Breach Notification Law; Data Brea, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Personally Identifiable Information, PII, Protection Bill AB2828, Risk management, Risk Management Blog

Election Day | Cyber Concern Runs High

Posted by Jon Edwards on Nov 8, 2016 1:41:30 PM

As the world focuses on the outcome of the contentious Presidential race between Trump and Clinton, the US government is on high alert for potential Election Day cyber attacks.  The current global cyber climate, this summer’s Russian hack of the Democratic National Committee, and a recent string of Distributed Denial of Service (DDoS) attacks have intelligence officials highly concerned that cyber event(s) could seriously infringe on today’s election process.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Risk, Cyber Security, Data Breach, Election Day Cyber Alert, Election Day Cyber Attack, High Alert Election Day Cyber Attack, Risk Management Blog

Presidential Election Cyber Vulnerabilities | What Can We Learn?

Posted by Jon Edwards on Nov 1, 2016 3:54:15 PM

With the Presidential Election only days away, the question remains: Will the election be hacked? In this case, a cyber breach can lead to two major issues. The first is stolen data of registered voters; the second issue and perhaps the more frightening one – manipulation of the election results.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Political Risk, Risk management, Risk Management Blog

What’s Behind the Counter? Enterprise Risk Management Can Be a Retailer’s Edge

Posted by Andrew Masini on Oct 19, 2016 7:06:42 PM

Enterprise Risk Management (ERM) concepts can help retailers create a competitive advantage out of the business of managing risk. ERM’s “portfolio view” collects all risk and mitigation activity into a single Risk Register. This enables management to coordinate mitigation efforts across functions, rather than leaving risk to be managed in a patchwork fashion among various pockets in the organization. These are the critical areas for retail organizations where embracing an ERM approach adds value and opportunities that would likely otherwise be “missed:”

Read More

Topics: Cyber Breach, Cyber Risk, Data Breach, Enterprise Risk Management (ERM), Enterprise Risk Management, Enterprise Risk Management, ERM, Reputational Risk, Retail Risk Management, Risk management, Risk Management Assessment, Risk Management Blog, Risk Register, Social Media Risk

Don’t Be “Phooled” | Phishing Scams Work!

Posted by Jon Edwards on Sep 13, 2016 3:57:40 PM

The Personally Identifiable Information (“PII”) of approximately 10,000 past and present employees of Seagate Technology, a leading electronics and data storage solutions manufacturer, was handed over freely to cybercriminals. The information included W-2 forms, names of beneficiaries, social security numbers of employees and spouses, etc. Needless to say, the impacted people are not thrilled and have brought suit against Seagate for malpractice and a lack of regard for employees affected by the negligent handling of data.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Phishing Scam, Risk Management Blog, Seagate Class Action Suite, Seagate Cyber Attack, Seagate Phishing Scam

Ransomware Events are on the Rise | Protect your Networks Now (Part 2)

Posted by Jon Edwards on Sep 6, 2016 3:08:17 PM

In Part 1 of this post, I noted that ransomware events are occurring much more frequently; as many as 4,000 a day since January 1st of 2016. We took a look at some preventative measures that may protect your company and its network/data against a ransomware event.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Incident Response Plan, Ransomware, Risk management, Risk Management Blog

Ransomware Events are on the Rise | Protect your Networks Now (Part 1)

Posted by Jon Edwards on Aug 23, 2016 4:19:14 PM

The U.S. Department of Justice stated that “More than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300 percent increase over the approximately 1,000 attacks per day seen in 2015.”

Read More

Topics: Breach of Security, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Data Breach, Healthcare, Ransomware, Retail, Risk Management Blog

The Importance of Password Diversity

Posted by Jon Edwards on Aug 9, 2016 5:48:32 PM

Between company logins, online banking, personal email accounts, and various social media accounts the average user is required to come up with a lot of passwords. Unfortunately, many use the same password for all of their logins, simply for the sake of convenience. This poses a huge security risk, as once any one of those services is hacked and the user’s password becomes compromised, all of the other accounts are in jeopardy.

Read More

Topics: Change Password Often, Cyber Breach, Cyber Liability, Cyber Risk, Cyber Security, Password Diversity, Risk Management Blog

Just Wait … It Gets Worse | the Sequel to Ransomware

Posted by Jon Edwards on Aug 3, 2016 10:18:56 AM

Cisco has released the 2016 Midyear Cybersecurity Report and their findings point to future, more sophisticated types of ransomware that will take full advantage of systems with less than satisfactory security measures, patching practices, and detection rates.

Read More

Topics: Breach of Security, Cisco Midyear Cybersecurity Report 2016, Cyber Breach, Cyber Risk, Cyber Security, Ransomware, Risk Management Blog

Is Access to Your Data for Sale?

Posted by Jon Edwards on May 3, 2016 2:22:43 PM

One of the most significant cyber threats to any company’s security is the Rogue Employee. Who is this person? Someone who has been entrusted with access to the system(s); (i.e. databases, customer records, HR records, confidential email, etc.) and who chooses to hurt the company and fellow employees by intentionally performing a wrongful act or providing another with the ability to do so.

Read More

Topics: Breach of Security, Cyber Breach, Cyber Risk, Cyber Security, Risk Management Blog

The ALS Group

Risk Management Blog

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all