Retail Cyber Risks…Explained

Should a cyber incident occur during a high traffic period, such as the holiday season, it could wreak havoc on a business’s bottom line or even put them out of business completely – not to mention the impact of how an organization responds on their reputation with their customers and employees.

So what can a retailer do to help mitigate this risk?
Continue reading

Posted in Cyber Risk, small business | Tagged , , , | Leave a comment

Cyber Liabilities Expanding for Government Contractors

With data breaches increasing in frequency, severity and complexity, government contractors at the federal and state levels are being asked to assume higher levels of liability as contracts are awarded or renewed.

Posted in Cyber Risk | Tagged , , , , | Comments Off

Understanding Cyber Liability Insurance

When speaking with small to medium size business (SMB) owners about network security or privacy events, such as a cyber breach, there’s some misunderstanding about their risk and how their current insurance program will respond to this type of loss. Often they believe that their general liability policy will protect them or that they’ve got coverage under their media liability or directors and officers liability policies. They are potentially both wrong and right. Continue reading

Posted in Cyber Risk, small business | Tagged , , , | Comments Off

Law Firms: A Wealth of Information for Hackers

Today’s attorneys may still scribble notes on yellow pads, but most own and conduct business using smartphones, tablets or laptops. With these new technologies have come new risks for law firms. Continue reading

Posted in Cyber Risk, Management Liability, Professional Liability | Tagged , | Comments Off

Cyber Extortion Poses Threat to Small & Large Business

Today, extortion has entered the digital age, with businesses increasingly at risk from criminals who hack their systems, steal private information and then impose demands — or else. While companies have been busy combatting the threat of hackers and data breaches, the threat of cyber extortion is often overlooked. Continue reading

Posted in Cyber Risk | Tagged , , , , | Comments Off

Data Breaches Escalate

If it seems like there have been more and more data breaches and cyber security incidents every year, it’s because there are. The total number of security incidents rose 48% to 42.8 million in 2014, according to PwC’s “The Global … Continue reading

Posted in General Risk | Tagged | Comments Off

Trashing Bytes of Information

Before disposing of any computers, laptops or any other electronic equipment that may contain personal information about employees, clients or customers, you should make sure that the information has been completely destroyed.

Continue reading

Posted in Cyber Risk | Tagged , , | Comments Off

Measuring the Pulse of a Breach

The consequences of data breaches for U.S. health care organizations suffering a privacy breach, as defined by Health Insurance Portability and Accountability Act (HIPAA), rose considerably in January 2013 when the HITECH Act became law. Today, fines for a single incident—once capped at $50,000—could go as high as $1.5 million for health care organizations and their business associates or contractors for cases of “willful neglect.”

Continue reading

Posted in Cyber Risk | Tagged , , , , | Comments Off

A Pepperoni Pie and Personal Info to Go

The recent cyber attack on Benny’s Pizza in Marysville, Ohio, is a grim reminder that no business is too small to be the victim of this crime. Small businesses are just as vulnerable as high-profile or major corporations when it comes to cyber attacks. Not only doesn’t size matter, but geographic location is not an indicator either. Hackers can access networks from anywhere in the country or the world.

Continue reading

Posted in Cyber Risk, Disaster Preparedness | Tagged , , | Comments Off

Breaches Can Flatline Healthcare Organizations

Hefty fines such as this can be a serious financial hardship for many small to midsize health care organizations, who are always closely watching their bottom line. Continue reading

Posted in Cyber Risk, Management Liability | Tagged , , | Comments Off