Category:  Cyber Insurance

Understanding Cyber Liability Insurance Seemingly every week, there’s another story in the news about a cyber breach wherein a well-known company, presumably with stringent security measures in place, has suffered a data breach and its data about its customers, transactions, or its customer’s financial information is now out in the wild. While breaches at the bigger companies make it to the n

Because of the convenience they offer, smartphones and tablet devices have become a ubiquitous presence in the modern business world. As usage soars, it becomes increasingly important to take steps to protect your company from mobile threats, both new and old. The need for proper phone security is no different from the need for a well-protected computer network. According to computer security s

The only way to protect the assets of your business is to carry adequate Commercial General Liability (CGL) Insurance. A CGL policy protects your business from damages caused by bodily injury or property damage for which your business is found to be legally liable. CGL is usually triggered first in the event of a loss, so many business owners don't feel an additional endorsement or stand-alone

If your company stores data and information digitally, you should have a cyber risk management program that addresses prevention, disclosure, crisis management and insurance coverage in the event of a data breach. Good cyber risk management requires the planning and execution of all four of these components. Develop Strategies to Prevent a Data Breach Your data breach prevention strategies m

  The Gramm-Leach-Bliley Act (GLB), also known as the Financial Modernization Act of 1999, was enacted to control the ways that financial institutions deal with their customers’ nonpublic personal information (NPI). Under the GLB Act, financial institutions are required to: Ensure customers’ NPI is properly protected (Financial Privacy Rule) Develop a written information securi

“Phishing,” a type of cyber attack in which a hacker disguises him- or herself as a trusted source online in order to acquire sensitive information, is a common and technologically simple scam that can put your employees and business at risk. However, more resourceful criminals are resorting to a modified and more sophisticated technique called “spear phishing,” in which they use personal

COVERAGE INSIGHTS: Cyber Liability Insurance As technology becomes increasingly important for successful business operations, the value of a strong cyber liability insurance policy will only continue to grow. The continued rise in the amount of information stored and transferred electronically has resulted in a remarkable increase in the potential exposures facing businesses. In an age wh