Ransomware continues to be a major issue for companies regardless of the size. It may be hard to believe, but the reason for this lies with the victims, because the quickest and most often used resolution to the attack is to pay the ransom. While paying the ransom, may resolve a problem for an organization, it encourages cyber criminals to continue the attacks.
OFAC Advisory Makes Paying Cyber Extortion Ransom Illegal
Topics: Cyber Security, Data Breach, Personal Cyber Risk
Parental Control Tools Online Can Mitigate Your Risks
Despite being full of positive, useful and educational information, the internet is chock-full of potential dangers, and your children can unintentionally get into quite a few uncomfortable and, sometimes, dangerous situations. These risks are even more prevalent now, as many parents are working from home and children are attending classes remotely. As highlighted in our past blogs on this topic, if you have a standard Homeowners policy, you will likely have little protection from the legal liabilities that can result from inappropriate actions via the internet. So, what can you do?
Topics: Cyber Risk, Personal Cyber Risk, Ransomware, homeowner's insurance
As September approaches, college students are collecting textbooks, polishing up their class schedules, and shopping for that perfect dorm room setup. Insurance is probably not the first thing on their minds. Unless - you are a Risk Management undergrad at Temple University. ALS Intern, Jason Glickstein, outlines why insurance should be on every college students’ back to school checklist.
Topics: Personal Cyber Risk, Property Risk, Risk Management Blog, Total Cost of Risk, homeowner's insurance
Is a Cyber Breach on Your Holiday Wish List? | The Internet of Things (IoT)
The holiday season usually means new tech gadgets for everyone to tap, swipe, click, and download. Most people who unwrap a new iPhone, MacBook, Smartwatch, Fitbit, or game console probably aren’t considering the ramifications of connecting those devices to the Internet and setting up new user accounts filled with their personal information. Unfortunately, we live in a time where have to, or at the very least, should.
Topics: Change Password Often, Cyber Breach, Cyber Security, Personal Cyber Risk, Risk Management Blog, Risk Tolerance, Total Cost of Risk (TCoR), hacking,