Vulnerable to Cyber Attacks? Get Technology Insurance Coverage

In 2015, “company outsiders” perpetrated 40% of cyber attacks while “company insiders” perpetrated 60% of these attacks, according to a report published by IBM. IBM defined an insider as anyone possessing either physical or remote access to a company’s digital assets. Although this will typically be an employee, it can also include business partners or […]

Read more

2016 Will Be the Year Ransomware Holds America Hostage

The Institute for Critical Infrastructure Technology (“ICIT”) has recently published a report titled 2016 Will Be the Year Ransomware Holds America Hostage. According to the report, companies need to prepare themselves for the threat posed by this rising form of hacking, which restricts access to an infected computer system, and demands the user pay a […]

Read more

Risks Ahead. Cyber Insurance – Is your company covered for a data breach?

According to technology research firm Gartner, the number of connected devices is expected to increase from 4.9 billion to 25 billion by 2020. Each of these devices potentially opens a door to cyber intruders. The market research firm International Data Corporation predicts that, if current trends continue, one of every four people around the globe […]

Read more

Risks Ahead. Cybercrime has risen globally in 2015.

Dell Inc. has reported a significant rise in cybercrime globally in 2015. “There have been repeated incidents of breaches against organizations who believed they had carried out their end-to-end security deployment perfectly,” said Dell SonicWALL country manager Amit Singh. Malware attacks also nearly doubled to 8.19 billion and Android ecosystem was the prime target, according […]

Read more

KMRD’s Employee Background Checking Service

KMRD Background Checks

Because hiring can be the most important activity undertaken by a company, KMRD Partners has partnered with Global HR Research (“GHRR”) to offer a background checking service to our clients. To learn more, click here http://www.ghrr.com/agent/background-check/kmrd-partners  or visit our Client Access Center. Here is how the service works: Simply provide your contact and business information […]

Read more

Risks Ahead. WiFi Warning

Risks Ahead. Call KMRD

Wi-Fi hot spots can leave you, your colleagues your staff and your hard won information wide open to hackers. Once they penetrate your server, all of your information is vulnerable, making you liable for any damages a party may bring in a breach allegation. This makes transferring risk through cyber insurance a critical component of […]

Read more

Auto Insurance Coverage – Can your vehicle be hacked?

KMRD Are You Ready for One Minute From Normal?

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? In February, we reported researchers had warned technology supporting driverless vehicles could be hacked by criminals to override safety features. The Guardian reported FBI concerns that terrorists might try to hack into […]

Read more

BYOD – Bring Your Own Device – Suggested Risk Control Measures

Cell Phone Risk

At our website www.oneminutefromnormal.com we ask visitors the question: What if an unscheduled event suddenly seizes control of your business? Are you ready? Although companies can save money by adopting a “bring your own device” policy, cyber risk is significantly heightened when employees carry company information outside the office. Manage your company’s risk with this […]

Read more

Cyber Risk Ahead. Wi-Fi Warning

Wi-Fi hot spots can leave you, your colleagues your staff and your hard won information wide open to hackers. Once they penetrate your server, all of your information is vulnerable, making you liable for any damages a 3rd party may bring in a breach allegation. This makes transferring risk through cyber insurance a critical component […]

Read more

Hall of Shame – No Information Risk / Cyber Liability Coverage – No Insurance Coverage Quality Control Process

This scenario represents an actual coverage flaw in an insurance program of a well run, profitable business. The following endorsement appeared on a policy designed to protect a company from cyber and information related risks. This endorsement clearly indicated there was insurance coverage for technology services.  However there was no coverage for their Telecommunications Services. The client’s […]

Read more

1 2

Got a Problem? We'd Love to Solve It!

Contact Us

top