Once upon a time, there was a point in time, that few companies knew cyber insurance existed. Fast forward to 2018, and most companies are aware of cyber insurance, and some have purchased coverage. However, many companies may not understand what their cyber insurance policy covers and excludes. Unbeknownst to them, this could haunt them until and after a cyber insurance …
Recapping September’s Data Breaches
September was quite the month for data breaches, with a Facebook data breach of 50 million user's data to an Uber settlement of $148M paid to Statw Attorneys General in all 50 states (including DC) plus 5 other severe data breaches that happened and kept the daily news feeds full in between. Facebook Date Discovered: 9/28/18 # of records: 50,000,000 How the breach happened: …
Continue Reading about Recapping September’s Data Breaches →
How to Respond When a Data Breach Occurs
Daily news reports are full of reports of IT security breaches, to the point where breach awareness is no longer an issue. Today, while we certainly have greater awareness and higher security budgets, executives still need to understand that getting hacked isn’t a matter of if but when. Indeed, this is the new normal in cyber security, and it changes a company's approach to …
Continue Reading about How to Respond When a Data Breach Occurs →
The Value of Cyber Insurance
While it may be 2018, there is still no 100% security, which is why stopping an attack early is crucial. Though when unknown security flaws often lay dormant for years, its become more of a question of how does your company know what it doesn't know? For instance, take the recently discovered Spectre and Meltdown security flaws which were dormant for almost 20 years before …
Cyber Insurance 2018 Message
Happy New Year! And so, the 2018 adventure begins. Indeed, today is the first blank page of your company's 365 cyber playbook. Write and make it a great one. For starters, be sure to add Cyber Security and Cyber Insurance to the top of your Company's 2018 To-Do list. While you may have heard that there are "two types of data breaches", today, there are two types …