In this issue, cyber in M&A; upcoming cyber webinars; the increase in cyber extortion; Attempts at federal breach laws; banks sue retailers over breach costs; and biometrics.
1 - 10 of 39 items [Currently showing All Items in Cyber Liability]
2017 was a record year for cyber attacks, and not in a good way. According to Risk Based Security, Inc., there were 3,833 breaches reported through the end of September 2017, exposing over 7 billion records. This represents an increase in the number of reported breaches of 18.2%, compared with the same period in 2016, with the number of exposed records up 305%.
Gallagher invites you to participate in a webinar series which will discuss the full gamut of cyber risk prevention services and tools across several fronts from issue awareness including employee privacy and security training to risks presented by outside third party service provider and vendors.
Leverage this video with your internal teams for an overview on the importance of cyber liability insurance and a comprehensive security program.
Ransomware (a common form of cyber extortion) is malicious software that blocks access to a victim’s data by locking a system or encrypting data until the victim agrees to pay a ransom. The frequency of ransomware attacks has increased drastically since these extortions began to emerge several years ago. In addition to increased frequency, the attacks have become more complex with the realization that the parties responsible for the infections have access to malware capable of crippling an entire network, while also having the ability to originate in one organization’s system, and use it as a conduit to access and infect third-party systems.
Cyber policies address the threats of intrusion attacks seeking to gain access to the insured’s computers and information. But how about social engineering fraud schemes such as telecommunication, funds transfer or computer fraud. There is potential for considerable overlap and confusion with the crime insurance policy.
The world of cyber risk continues to develop and expand since our May 2016 paper on Medical Device Cybersecurity. The threat of ransomware has come to the forefront as demonstrated by global attacks such as Wannacry2 and Petya. These attacks show how hackers have become more sophisticated in their ability to use malware to exploit vulnerabilities in systems, hardware and devices, as well as highlighting the vulnerabilities of devices and systems that, through their lack of patching and support, and outdated operating systems, are exposed to hacking, worms, etc., that can affect patient safety, system security and data integrity.
Cyber attacks have unfortunately become a common occurrence in today’s business economy. Organizations of all sizes, from small businesses to global enterprises, must take endpoint detection and prevention into consideration when establishing a cybersecurity strategy
Ransomware is a type of malicious software that infects a computer and then holds the data hostage by encrypting the files until victims pay to have them unlocked. It comes in two major types: cryptors and blockers.
As we enter the start of the tax filing season, it is already becoming apparent that fraudulent access to W-2 information is once again highly sought after information. Unfortunately, many organizations are in danger of becoming unsuspecting victims, by releasing W-2 documents as a result of what appears to be valid communications requesting this information. However, in actuality, these communications are scams designed to acquire databases containing W-2 information in order to file fake tax returns and perpetrate identity theft.