Social Engineering and How To Protect Your Computer From Hackers, Viruses, and Spies

protect your computer from hackers

While Social Engineering may sound like a way to encourage people to mingle at a dinner party, it is actually a devious plot created by hackers and spies to infiltrate your computer and business networks through a number of nefarious tactics, including the following: Phishing Chances are you’ve been the target of a phishing attack […]

Read more

Social Engineering Webinar: How Criminals Exploit Human Behavior and How to Protect Your Enterprise

Social Engineering Webinar KMRD 2

Social engineering is the art of exploiting human psychology to gain access to buildings, systems or data. Join us for this free webinar to learn how social engineering works and what to do to protect employees and your enterprise. Join top risk management and cyber insurance experts for an interactive discussion on how to protect […]

Read more

Cyber Risk Transfer: Can you transfer your cyber / privacy risk contractually?

cyber risk transfer

With the advent of more frequent privacy breaches, sophisticated companies are trying to push risk contractually to their vendors and even their clients. Reading a cloud hosting contract or other cloud software platform agreement, this cyber risk transfer trend is evident. Questions about cyber risk transfer which need answers – 1 – Can organizations obtain additional […]

Read more

10 Situations When You Need Pollution Liability Insurance

Pollution Liability Insurance

Oil and chemical companies understand the need for pollution liability insurance coverage. But they aren’t the only ones with potential exposure to pollution-related incidents. In fact, many other types of companies have uninsured pollution exposures. And it’s possible there are literally thousands of companies exposed and unaware of the financial risk they currently face. We can’t know for sure […]

Read more

Got a Problem? We'd Love to Solve It!

Contact Us

top