Select Page:  Posts Per Page

Cyber-Attacks Target Life Sciences and Healthcare Industries

As our society becomes more and more digital, it is increasingly important to protect your businesses from the repercussions of a cyber-attack. While creating privacy policies, building secure firewalls and being diligent with security are all critical to preventing a cyber-attack, it is equally critical to have the proper insurance program in place, should a breach occur. Cyber-attacks can be extremely costly and it is a common misconception that the associated damages would be covered under conventional insurance policies.

A common target of online criminals, the life sciences and healthcare industries need to be extra diligent when it comes to…

Online Scams – Don’t Fall For Them

As the year winds down, and the holidays approach, fraudsters are gearing up for a busy season. The 2016 Identity Fraud Study, released by Javelin Strategy & Research, found that $15 billion was stolen from 13.1 million U.S. consumers in 2015. Unfortunately, these days there seems to be a new scam popping up every day. Here is a quick list of the most common ones and how to avoid them:

Online Fraud – Auction fraud is one of the most common ways fraudsters are using the Internet to defraud people. This type of scheme often involves either a seller failing…

Tips to Protect Your Device from Hackers

Phishing continues to be the most common way for attackers to gain access to your device. Phishing can be done in many forms, most commonly through email. However, the sudden rise of popular games on mobile devices, like Pokémon Go, has given the attackers the opportunity to take advantage of unsuspecting users in new ways.

For phishing to occur in an application, a compromised version of an otherwise safe and well known application will be hosted on a site other than the major distributor of the app (iTunes, Google Play). Once installed, the application will take advantage of a vulnerability…

Cyber Liability 101

Collecting, transmitting or storing personal data across the Internet or in paper files creates cyber, privacy and data liability for a business. Most businesses will encounter this type of risk and should be aware of the coverages available for these increasing exposures. A common misconception is that these exposures are covered under a General Liability policy, when the fact is they are often excluded or the included coverage is very limited.

Due to increases in today’s business operations being conducted across the Internet, there has been an increase in hackers and data breaches around the world. Having an insurance consultant…

Protect Yourself from Ransomware

Have you heard the term ransomware recently?

Ransomware is a form of malware that can be very destructive. It can be downloaded when an unsuspecting user clicks on an email link or visits a website that is infected. Once the ransomware has installed itself, it goes to work encrypting all of the data on the computer’s hard drive. Upon completion of the encryption, a screen is displayed that will inform the user that they have a certain amount of time to transfer the “ransom” to the attacker or their data will be either left encrypted and inaccessible or destroyed. Usually…

Select Page: