Cyber Insurance – Public Wi-Fi Risks

Wi-Fi hot spots can leave you, your colleagues, and your staff wide open to hackers. Once hackers penetrate your server, your company’s information is vulnerable. This makes transferring risk through cyber liability insurance a critical component of your company’s risk management program. 95% of Wi-Fi data traffic is unencrypted. T-Mobile and AT&T— the largest providers […]

Read more

Risks Ahead. Cyber Risk – Midsize business owners/executives view data breach as a minor risk.

According to Hartford’s Midsize Business Monitor, midsize business owners/executives responded as follows regarding cyber risk: 82% view data breach as at least a minor risk 81% report storing sensitive data 68% believe they are at least somewhat likely to experience a phishing incident in the next three years 45% experience a phishing incident in the […]

Read more

Risks Ahead. WiFi Warning

Risks Ahead. Call KMRD

Wi-Fi hot spots can leave you, your colleagues your staff and your hard won information wide open to hackers. Once they penetrate your server, all of your information is vulnerable, making you liable for any damages a party may bring in a breach allegation. This makes transferring risk through cyber insurance a critical component of […]

Read more

Cyber Insurance Coverage – Beware Public Wi-Fi Risks

KMRD - Are You Ready For One Minute From Normal?

Features which make free public Wi-Fi hotspots desirable for honest citizens also make them appealing to hackers; namely, they require no authentication to establish a network connection. This enables hackers to obtain easy access to unsecured devices on the same network. The biggest threat to security on a public Wi-Fi network is the hacker’s ability […]

Read more

Cyber Insurance Coverage – Is a hacker riding shotgun in your company’s vehicles?

KMRD Are You Ready for One Minute From Normal?

Today’s cars can stream music, place phone calls, navigate and much more. Essentially, they are smartphones on wheels. Just like smartphones, they can be hacked. “Software operating today’s vehicles easily have more than 100 million lines of code — more than a modern fighter jet, airliner or typical operating system such as Windows,” according to […]

Read more

Auto Insurance Coverage – Can your vehicle be hacked?

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? In February, we reported researchers had warned technology supporting driverless vehicles could be hacked by criminals to override safety features. The Guardian reported FBI concerns that terrorists might try to hack into […]

Read more

BYOD – Bring Your Own Device – Suggested Risk Control Measures

Cell Phone Risk

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? Although companies can save money by adopting a “bring your own device” policy, cyber risk is significantly heightened when employees carry company information outside the office. Manage your company’s risk with this […]

Read more

Cyber Risk Ahead. Wi-Fi Warning

Wi-Fi hot spots can leave you, your colleagues your staff and your hard won information wide open to hackers. Once they penetrate your server, all of your information is vulnerable, making you liable for any damages a 3rd party may bring in a breach allegation. This makes transferring risk through cyber insurance a critical component […]

Read more

Get up to 20% off your cyber insurance premium

Slightly more than 50% of risk managers now purchase stand-alone cyber insurance policies, according to a survey by the Risk & Insurance Management Society. 74% of those without cyber coverage are considering obtaining it within the next 12-24 months. Respondents reported the top three first-party cyber exposures: Reputational harm Business interruption Data breach response and […]

Read more

Beware The Dyre Wolf. Cyber Criminals

Cell Phone Risk

With recent worry about coyotes roaming New York City and New Jersey streets, a wolf problem has gone pretty much unnoticed. According to Reuters, IBM has uncovered a sophisticated fraud scheme dubbed “The Dyre Wolf” and run by a well-funded Eastern European gang of cyber criminals that uses a combination of phishing, malware and phone […]

Read more

1 2 3 4 5 8

Got a Problem? We'd Love to Solve It!

Contact Us

top