Gallagher invites you to participate in a webinar series which will discuss the full gamut of cyber risk prevention services and tools across several fronts from issue awareness including employee privacy and security training to risks presented by outside third party service provider and vendors.
1 - 10 of 37 items [Currently showing All Items in Cyber Liability]
Leverage this video with your internal teams for an overview on the importance of cyber liability insurance and a comprehensive security program.
Ransomware (a common form of cyber extortion) is malicious software that blocks access to a victim’s data by locking a system or encrypting data until the victim agrees to pay a ransom. The frequency of ransomware attacks has increased drastically since these extortions began to emerge several years ago. In addition to increased frequency, the attacks have become more complex with the realization that the parties responsible for the infections have access to malware capable of crippling an entire network, while also having the ability to originate in one organization’s system, and use it as a conduit to access and infect third-party systems.
Cyber policies address the threats of intrusion attacks seeking to gain access to the insured’s computers and information. But how about social engineering fraud schemes such as telecommunication, funds transfer or computer fraud. There is potential for considerable overlap and confusion with the crime insurance policy.
The world of cyber risk continues to develop and expand since our May 2016 paper on Medical Device Cybersecurity. The threat of ransomware has come to the forefront as demonstrated by global attacks such as Wannacry2 and Petya. These attacks show how hackers have become more sophisticated in their ability to use malware to exploit vulnerabilities in systems, hardware and devices, as well as highlighting the vulnerabilities of devices and systems that, through their lack of patching and support, and outdated operating systems, are exposed to hacking, worms, etc., that can affect patient safety, system security and data integrity.
Cyber attacks have unfortunately become a common occurrence in today’s business economy. Organizations of all sizes, from small businesses to global enterprises, must take endpoint detection and prevention into consideration when establishing a cybersecurity strategy
Ransomware is a type of malicious software that infects a computer and then holds the data hostage by encrypting the files until victims pay to have them unlocked. It comes in two major types: cryptors and blockers.
As we enter the start of the tax filing season, it is already becoming apparent that fraudulent access to W-2 information is once again highly sought after information. Unfortunately, many organizations are in danger of becoming unsuspecting victims, by releasing W-2 documents as a result of what appears to be valid communications requesting this information. However, in actuality, these communications are scams designed to acquire databases containing W-2 information in order to file fake tax returns and perpetrate identity theft.
As we realize the extent that technological advancements have had on all organizations, we take an insurance perspective to look back at 2016 while also looking forward to 2017. Overall, 2016 was a year of stability for the cyber insurance industry. However, a relatively new insurance concept has evolved; cyber insurance can now be referred to as “traditional” cyber insurance.
Every organization should focus on cyber security. Governments and consumers alike are pressuring organizations to reduce the frequency of cyber events.