News
The Intriguing Story of LabMD – Part 1
This is a rather different story of a cyber breach than what we usually write about. Instead of a company pitted against an unknown hacker whose identity will probably never be known, this one is about the cyber fight of one company, LabMD, with another, Tiversa. It...
Directors and Officers On the Hook For Breach-Related Mismanagement
In response to a security breach in 2000 at the State Department, then Secretary of State Madeleine Albright told her staff, “I don’t care how skilled you are as a diplomat, how brilliant you may be at meetings, or how creative you are as an administrator – if you are...
Penetration Tests
To offer maximum value to our insureds and stand out from the competition, we as insurance professionals need to do more than just offer our clients good coverage. We also need to help them with the bigger risk management picture. For example, you may sell your client...
Overcoming Client Objections to Cyber Coverage – Part 1
“Cyber Liability... What is that, exactly? Do you mean data breach insurance? That has something to do with technology, right? Like, internet insurance?” These were some of the questions we saw in the early years of cyber liability products. Today though, the...
Physical Security is Vital to Defend Against Hacking
There are a lot of things that a business can do to from a digital standpoint to boost its IT security, and we’ve written repeatedly about some of these methods. But physical security of computer resources, and particularly laptops, is also critical in maintaining a...
Redeveloping Florida’s Remote Southern Coast
[fusion_builder_container hundred_percent="no" equal_height_columns="no" menu_anchor="" hide_on_mobile="small-visibility,medium-visibility,large-visibility" class="" id="" background_color="" background_image="" background_position="center center"...
Current Cyber Threats and Market Update
Cyber policies from various carriers are widely different products that make it nearly impossible for the average buyer to effectively compare. Industries most frequently breached are healthcare, higher education, and financial services. But all companies have email,...
PCI and The C suite
Cyber security and pre breach planning need to be a priority of the C Suite. Executives who think they can leave these issues solely to the IT team do so at their own peril
Breach planning basics – Part 2
In our last article, we discussed some steps your company can take in developing an Incident Response Plan (IRP). Among them were designating a member of management to be responsible for the IRP, and selecting employees from management, IT, legal, marketing, and...
Breach planning basics – Part 1
We’ve been saying for a long time that no company is safe from a cyber attack. Even small companies that don’t operate in industries typically known for housing sensitive data, such as finance, education, and medicine, still have valuable information that someone...
Newsletter Sign Up
Please fill out the form below to receive a quote from one of our specialists. If you need immediate assistance, please call us at 1-888-932-7475.