Most CEOs or CFOs are probably not Cyber Security experts, but are entrusted to ensure the company runs efficiently and profitably. In today’s business IOT world, having a safe and secure network is a large part of keeping the business operational. This includes ensuring that all cyber related risks are minimized as much as the budget will allow. Cyber related issues that threaten the company’s income are scary for sure, but perhaps the most frightening aspect of keeping your network and data secure are the “unknowns” of IT.
Topics: Cyber Insurance, Cyber Security, Enterprise Risk Management, Total Cost of Risk (TCoR), risk management consultant
These days, with most of us stuck at home and doing the majority of shopping and banking online, the risk of cyber criminals hacking into our networks to get to our bank accounts and/or personal information is greater than ever. While we have made considerable advances in cyber-security, so have the cyber criminals which is one of the reasons we are starting to see insurance policies that protect personal information in the event of a breach.
The market for this type of insurance is still new, but it can be quite inexpensive to add cyber protection to homeowner’s policy if the insurer who wrote the policy provides it.
Topics: Cyber Insurance, Cyber Risk Mitigation, fraud, homeowner's insurance
Given the widespread awareness of Cyber Risk and the increasing trend for companies to consider insurance around this exposure, a company’s preparedness for a Cyber risk related event should be a part of their risk management plan. Unfortunately, for most organizations, this part of the plan has not been matured. That’s a mistake…
Topics: Crisis Risk Management, Cyber Breach, Cyber Insurance, Cyber Risk, cyber attacks
Topics: Cyber Insurance, Cyber Risk Mitigation, Cyber Security, Phishing Scam, Risk management, Risk Mitigation, Total Cost of Risk (TCoR), cyber attacks, what is total cost of risk, ceo scams, cfo scams, ceo fraud, what is risk management
Multiple sources reported yesterday that hackers encrypted files on computers belonging to the city of Newark and have demanded $30,000 worth of Bitcoin to restore them.
Topics: Cyber Breach, Cyber Insurance, Cyber Security, Ransomware, cyber attacks
Identity theft is the fastest growing crime in the United States. Each year, more than 15 million Americans fall victim. It’s also the number one consumer complaint received by the Federal Trade Commission.
Topics: Cyber Insurance, Cyber Risk, Cyber Risk Mitigation
Globalization and dependence on the internet for data storage over the past decade has exposed companies to a whole new set of risks. As this trend continues, so too does the risk associated with breaches of domestic or international servers. Massive data breaches happen with alarming frequency. In the past few years, there have been several high profile attacks affecting companies like:
Topics: Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Risk Mitigation, cyber attacks
You’ve heard of cyber attacks causing customer data breaches, business interruptions, reputation management issues, and public relations nightmares – but what about physical damage?
Topics: Cyber Insurance, Cyber Risk, cyber attacks
Cyber risk continues to evolve at a breakneck pace.
Insurers are working to keep up by customizing policies and endorsements based on the size and business model of the insured. At last week’s third annual International Cyber Risk Management Conference, Matthew Davies, Assistant Vice President of Chubb Insurance Company of Canada, outlined a few key points on what cyber security practices a small organization to already have in place when looking to procure cyber insurance.
Topics: Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Risk Mitigation, Cyber Security
In 2015 The Internet Crime Complaint Center received 288,012 complaints of cyber attacks totaling more than $1.07 billion in reported losses. Those numbers are based only on incidents that were reported to the FBI. When we talk about cyber risk, data theft, and the threat of Ransomware, we usually focus on prevention strategies. But being prepared to respond quickly and efficiently when an event does occur is just as important to operations recovery, cost reduction, and reputation management.
Topics: Cyber Breach, Cyber Insurance, Cyber Liability, Cyber Risk, Cyber Security, cyber attacks