Reviewing Cyber Breach Insurance Coverage | First-Party Costs

Posted by Jon Edwards on Jan 31, 2017 6:02:18 PM

Organizations today must regard cyber breaches not as a possibility, but as an inevitable fact of life. In this environment, it’s crucial to have a cyber liability insurance policy that adequately covers the potential loss and offers payment or reimbursement for response costs. Understanding what’s covered by the policy well before a breach occurs and building that knowledge into your company’s incident response plan is critical.

Read More

Topics: Cyber Risk

Is Your Mobile Device Putting Your Company at Risk?

Posted by The ALS Group on Jul 6, 2016 1:42:01 PM

Are you addicted to your mobile device? Most of us are. Everything is a tap or swipe away. You can check account balances, pay bills, order from online stores, deal with business email and documents, etc… Essentially, mobile devices allow you to manage your life untethered. Hackers realize that too and are targeting mobile devices more than ever.

Read More

Topics: Cyber Risk

Cyber Coverage – What’s Missing in Your Policy?

Posted by Jon Edwards on Jun 28, 2016 11:03:47 AM

In several of my most recent “Cyber Tuesday” posts, I’ve discussed the importance of developing a comprehensive cyber risk mitigation strategy which includes IT security measures, well thought out incident response, business continuity documentation and cyber insurance. A recent ransomware event at the University of Calgary shifted the focus to the cyber insurance.

Read More

Topics: Cyber Risk

Is Access to Your Data for Sale?

Posted by The ALS Group on May 3, 2016 2:22:43 PM

One of the most significant cyber threats to any company’s security is the Rogue Employee. Who is this person? Someone who has been entrusted with access to the system(s); (i.e. databases, customer records, HR records, confidential email, etc.) and who chooses to hurt the company and fellow employees by intentionally performing a wrongful act or providing another with the ability to do so.

Read More

Topics: Cyber Risk

Insider IT Threats

Posted by The ALS Group on Sep 22, 2014 1:28:49 PM

IT-related threats originate from multiple angles, all of which require proper attention and application of mitigation techniques. Perhaps the biggest threat to a company’s IT security is their internal contacts (staff, vendors, contractors, etc.). Many companies are utilizing heightened IT security measures, but fail to account for the negligible or malicious actions from these internal contacts who often have high-level access to company systems.  Inside access often isn’t monitored and can easily lead to stolen data or corrupted systems.

Read More

Topics: Cyber Risk

Don't Lose It Over a Data Breach

Posted by The ALS Group on Apr 18, 2014 10:18:16 AM

Many of the cyber risks discussed today revolve around outside intrusions such as data breaches, viruses, or reputational risks brought on by improper social media use. Another significant risk that must be considered is a major data loss event, whether caused by a technical malfunction or a non-technical property loss such as fire or water damage. While you cannot guarantee a data loss will not happen, there are ways to indemnify and protect yourself if you experience such a data loss.

Read More

Topics: Cyber Risk

The ALS Group

Risk Management Blog

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to Email Updates

Recent Posts