Resources by solution

1 - 10 of 35 items [Currently showing All Items in Cyber Liability]

Defense Against Ransomware

Ransomware (a common form of cyber extortion) is malicious software that blocks access to a victim’s data by locking a system or encrypting data until the victim agrees to pay a ransom. The frequency of ransomware attacks has increased drastically since these extortions began to emerge several years ago. In addition to increased frequency, the attacks have become more complex with the realization that the parties responsible for the infections have access to malware capable of crippling an entire network, while also having the ability to originate in one organization’s system, and use it as a conduit to access and infect third-party systems.

Medical Device Cybersecurity

The world of cyber risk continues to develop and expand since our May 2016 paper on Medical Device Cybersecurity. The threat of ransomware has come to the forefront as demonstrated by global attacks such as Wannacry2 and Petya. These attacks show how hackers have become more sophisticated in their ability to use malware to exploit vulnerabilities in systems, hardware and devices, as well as highlighting the vulnerabilities of devices and systems that, through their lack of patching and support, and outdated operating systems, are exposed to hacking, worms, etc., that can affect patient safety, system security and data integrity.

Tag(s): Healthcare; Cyber Risk; Cyber Liability; Life Sciences; Management Liability;

Ransomware

Ransomware is a type of malicious software that infects a computer and then holds the data hostage by encrypting the files until victims pay to have them unlocked. It comes in two major types: cryptors and blockers.

Tag(s): Cyber Risk; Cyber Liability;

W-2 Phishing Scams Return

As we enter the start of the tax filing season, it is already becoming apparent that fraudulent access to W-2 information is once again highly sought after information. Unfortunately, many organizations are in danger of becoming unsuspecting victims, by releasing W-2 documents as a result of what appears to be valid communications requesting this information. However, in actuality, these communications are scams designed to acquire databases containing W-2 information in order to file fake tax returns and perpetrate identity theft.

Tag(s): Cyber Risk;

Market Conditions 2017 - Cyber Liability

As we realize the extent that technological advancements have had on all organizations, we take an insurance perspective to look back at 2016 while also looking forward to 2017. Overall, 2016 was a year of stability for the cyber insurance industry. However, a relatively new insurance concept has evolved; cyber insurance can now be referred to as “traditional” cyber insurance.

Marine Practice Group Webinar

Recently, the Government Accountability Office, the Department of Homeland Security and the United States Coast Guard have all issued warnings regarding the vulnerability of the maritime industry to cyberattacks and have provided suggestions to reduce the risk.