
On 14th April 2016, the European Parliament voted to pass ‘The regulation on the protection of individuals with regard to the processing of personal data and the free movement of such data’ or, as...
The continuing evolution of cyber risk
The increasing concern around cyber risk continues to dominate discussions in nearly all forums across industries and public sectors. This takes the form...
Businesses know the data they hold on their networks is valuable, they just don’t know how valuable. Some have taken no action to determine the value of their data, as well. The information was...
Cyber insurance didn’t keep the University of Calgary from recently paying roughly $15,000 after being hit by hackers, but a college official said other schools should consider buying coverage after...
Cyber insurance has been around for almost a decade, but only now is a popular safeguard against hackers.
Almost every industry, from agriculture to healthcare, is using online data...
MIT researcher and entrepreneur Kevin Ashton first coined the term “Internet of Things” (IoT) in 1999 while working at Auto-ID Labs. Ashton was referring to a global network of objects...
Well-known restaurant chain P. F. Chang’s China Bistro just sustained a significant hit to its cyber insurance coverage. The federal court’s opinion serves as a lesson to policyholders...
Cyber insurance didn’t keep the University of Calgary from recently paying roughly $15,000 after being hit by hackers, but a college official said other schools should consider buying coverage after...
With the growing frequency of cyberattacks, healthcare organizations are discovering the need for an extra layer of protection to cover the loss of funds incurred from a security breach.
Over the...
HARROGATE, England — Cyber threats pose the biggest worries for members of U.K. risk management association Airmic Ltd., but less than half actually buy the coverage.
Forty-six percent of the 150...
Today, I am pleased to announce the release of the 2016 Cost of Data Breach report in partnership with IBM Security. Every year, we report on the findings from our survey of organizations worldwide —...
It has been said that there are two types of companies in the world – those that have been hacked, and those that do not yet know they have been hacked. While perhaps an overstatement, it seems that...
by Yoav Leitersdorf, Ofer Schreiber, Iren Reznikov.
If, or more accurately, when your company is hit by a cyber attack, do you have what you need to recover? Do you know what kind of losses you can...
Don't panic, prioritise and plan for EU GDPR - and if you do the right thing for your customer, the chances are you will be compliant and avoid potentially hefty fines for data breach.
Don't...
In the wake of the release of the so-called Panama Papers, businesses have dreaded suffering from such data breaches that expose their most confidential information. Cyber security insurance,...
Pre and post-incident loss testing is of paramount importance if companies wish to prepare for a cyber attack, and company boards should be more involved with cyber exposure prevention, according to...
Mimecast warns organisations relying on cyber insurance: your policies may not be fully up-to-date in covering new social engineering email attacks.
Steven Malone, Mimecast
Mimecast opened...
Design, engineering, and construction have a multitude of project risks. Most of these are identified, well-defined, and, hopefully, allocated to the party most capable of managing the risk. However...
Trending: dramatic increase in volume of malicious spam
The first quarter of 2016 saw a dramatic increase in the number of unsolicited emails containing malicious attachments. Over the last two years...
Nine out of ten businesses in the United States have experienced at least one hacking incident in the past year, according to a survey released on Tuesday by The Hartford Steam Boiler Inspection and...