Errors with E&O – Part 2

KMRD Are You Ready for One Minute From Normal?

If human beings were perfect, there would be no need for Errors & Omissions coverage. Until we get to the level of expertise suggested, we are fortunate it exists. An international investment management company hired Do It Right Software Solutions to build a Secure Client Space. In its Scope of Work, Do It Right listed […]

Read more

Errors with E&O – Part 1 – KMRD

Stress

During the otherwise error free month of June we will review how professional liability insurance, also known as E&O, can help three fictitious firms be ready for one minute from normal. Let’s begin with the question: How do you know if your firm needs professional liability insurance? Traditionally, “learned professions” including legal, medical, engineering, accounting […]

Read more

Don’t make these E&O errors

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? Insufficient or incorrect E&O coverage could financially ruin your firm one minute from normal. Following are a few “don’ts” regarding your E&O coverage following an incident: Don’t alter or make changes to […]

Read more

Cybersecurity alert

KMRD Are You Ready for One Minute From Normal?

During the past month we have provided a series of stories and discussions regarding  data breach and cyber security risks. We welcome your feedback. If your data is being stolen, does it make a sound? When VeriSign reported a series of stealth data breaches, it became clear no organization is immune from these intrusive actions. […]

Read more

Risks and Rewards of Bring Your Own Device

This is last in a series of four messages regarding the risks associated with data breach events and cyber security.  We welcome your feedback on the information we’ve provided you over the last four weeks. As if there weren’t already enough concerns regarding cyber security, we can now add the Bring Your Own Device (BYOD) […]

Read more

Could a data breach wreck your company?

KMRD Are You Ready for One Minute From Normal?

One minute from normal following a cyber attack, the average annual cost for small to mid sized businesses has reached $200,000. Just one laptop or a thumb drive packed with sensitive information costs an average $50,000 – including forensics, notification costs, lost intellectual property, and legal, consulting and regulatory expenses. Nearly every state requires companies […]

Read more

If your data is being stolen, does it make a sound? Cyber Security Insurance is a must.

When VeriSign recently reported a series of stealth data breaches,it became clear no organization is immune from these intrusive actions. After all, VeriSign is responsible for delivering visitors to more than half of the world’s websites and was one of the leading providers of SSL Certificates. According to a prominent security consultant, the VeriSign security […]

Read more

It’s 12:00. Do you know who is downloading your documents?

KMRD Are You Ready for One Minute From Normal?

According to a report from The Wall Street Journal, an unscheduled event arrived for Nortel Networks more than 10 years ago. In 2010, hackers with China-based internet addresses stole passwords from seven key company executives.  Using these passwords, the hackers accessed company reports, business plans, employee e-mails and other confidential documents. When the breach was […]

Read more

It’s 12:00. Do you know where your mobile device is?

Cell Phone Risk

According to Morgan Stanley, mobile device sales will exceed personal computer sales this year. Unfortunately, company policies regarding mobile device security have lagged dangerously behind.  Industry experts and cyber security thought leaders all agree; the next wave of hacking and data theft will not target laptops.  It will target mobile communication devices.  Following is a […]

Read more

Cyber security is an enterprise level assignment

Once upon a time, security management for sensitive data either personal or professional, would be limited to the IT department. Today, cyber risks are wide ranging and include lost or stolen data, violation of privacy laws, intellectual property infringement and social media-related risks such as cyber-bullying and textual harassment.  As a result, the combined efforts […]

Read more

1 4 5 6 7

Got a Problem? We'd Love to Solve It!

Contact Us

top