Vulnerable to Cyber Attacks? Get Technology Insurance Coverage

In 2015, “company outsiders” perpetrated 40% of cyber attacks while “company insiders” perpetrated 60% of these attacks, according to a report published by IBM. IBM defined an insider as anyone possessing either physical or remote access to a company’s digital assets. Although this will typically be an employee, it can also include business partners or […]

Read more

Cyber Risk Ahead. Wi-Fi Warning

Wi-Fi hot spots can leave you, your colleagues your staff and your hard won information wide open to hackers. Once they penetrate your server, all of your information is vulnerable, making you liable for any damages a 3rd party may bring in a breach allegation. This makes transferring risk through cyber insurance a critical component […]

Read more

Get up to 20% off your cyber insurance premium

Slightly more than 50% of risk managers now purchase stand-alone cyber insurance policies, according to a survey by the Risk & Insurance Management Society. 74% of those without cyber coverage are considering obtaining it within the next 12-24 months. Respondents reported the top three first-party cyber exposures: Reputational harm Business interruption Data breach response and […]

Read more

Beware The Dyre Wolf. Cyber Criminals

Cell Phone Risk

With recent worry about coyotes roaming New York City and New Jersey streets, a wolf problem has gone pretty much unnoticed. According to Reuters, IBM has uncovered a sophisticated fraud scheme dubbed “The Dyre Wolf” and run by a well-funded Eastern European gang of cyber criminals that uses a combination of phishing, malware and phone […]

Read more

15,435 internet vulnerabilities identified in 2014 – No April Fool’s Joke Here!

Internet vulnerabilities

According to IT security solutions provider Secunia, a total of 15,435 vulnerabilities were identified in 2014 in 3,870 applications from 500 vendors. This represents an 18% increase compared to the previous year, and a 55% increase over five years. Of the total number of flaws detected last year, 11% were rated “highly critical.” 18 products […]

Read more

Choosing the right carrier for network security and privacy liability

  As targeted network attacks continue to rise and governmental agencies increasingly regulate the privacy and data security environment, an increasing number of organizations are transferring their risk to insurance products. In many cases, organizations find they have little choice. It has become common for written contracts to require service providers to obtain coverage for […]

Read more

Risks Ahead. Texting while driving creates a crash risk 23 times worse

Auto Accident About to Happen

The Virginia Tech Transportation Institute found that text messaging creates a crash risk 23 times worse than driving while not distracted. Yet, in an online survey of drivers in Erie, Pennsylvania, 30% of the respondents admitted to texting while driving. 75% reported observing others doing it. Following are other forms of distracted driving respondents reported […]

Read more

Will your cyber coverage cover you when you weren’t attacked?

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? One minute from normal can occur even though your own network has not been breached, every company laptop is secure and no mobile devices have been left behind in a rental car. […]

Read more

Texting while Driving – Staff, family, and friends should watch this video

KMRD Are You Ready for One Minute From Normal?

More than 2 million people have viewed AT&T’s 35-minute film, “From One Second to the Next,” on YouTube. It shows how heedless texting while driving violently disrupted so many lives. The potential personal tragedy is reason enough to make this film must viewing for all members of your organization. Potential financial implications from an employee’s […]

Read more

1 2 3 4

Got a Problem? We'd Love to Solve It!

Contact Us

top