Articles by Hilary Tuttle

Grid: Locked — Managing the Risks of Hacking the Electric Grid

Grid: Locked — Managing the Risks of Hacking the Electric Grid

As more hackers focus on critical infrastructure, risk managers and consumers must prepare for the risks of cyberattacks on the electric grid.

 
Majority of U.S. Workers Report Hostile Workplaces

Majority of U.S. Workers Report Hostile Workplaces

Whether to manage the risks of labor shortages or workplace conflict and litigation, businesses may need to take a hard look at their culture.

 
Notepad: Risk in Review – September

Notepad: Risk in Review – September

Hackers extort HBO, Kanye West v. Lloyd’s, voting machine flaws exposed, and more.

 
Cyberbreaches Cost Companies Billions in Long-Term Value

Cyberbreaches Cost Companies Billions in Long-Term Value

A typical severe cyberbreach results in the permanent loss of 1.8% of a company’s value relative to its competitors.

 
Ransomware Ready: How to Prepare for the Day You Get Locked Out

Ransomware Ready: How to Prepare for the Day You Get Locked Out

As widespread ransomware attacks force organizations to take the threat more seriously, it is critical to develop a clear response strategy.

 
The High Risk of a Low Cyber IQ

The High Risk of a Low Cyber IQ

Every organization’s biggest cyberrisk is its employees—and even employees agree.

 
Notepad: Risk in Review – June

Notepad: Risk in Review – June

Hacking the French election, a unicorn fight, a reputation crisis at United Airlines and more.

 
Put Your Money Where Your Risk Is

Put Your Money Where Your Risk Is

Despite reporting drastically higher cyber exposure, businesses are spending four times more on insurance to cover property-related risks.

 
Notepad: Risk in Review – May

Notepad: Risk in Review – May

North Carolina’s bathroom bill repeal, the Atlantic hurricane season outlook and more.

 
Fighting Bribery and Corruption

Fighting Bribery and Corruption

A plurality of risk and compliance professionals believe the top risk to their anti-bribery and corruption program will come from third parties.

 
Risk Management Priorities

Risk Management Priorities

With increasing ERM adoption and risk management visibility, what are the top risk management priorities for 2017?

 
W-2 Phishing Scam Targets Tax Season

W-2 Phishing Scam Targets Tax Season

Fraudsters are using business email compromise techniques to steal W-2 information.

 
Q&A: Bridging the Gaps at PayPal

Q&A: Bridging the Gaps at PayPal

PayPal’s Laura Langone discusses cyber insurance and the role of education in the buying process.

 
BYOD Risk Meets IoT Reality

BYOD Risk Meets IoT Reality

Enterprises struggle to understand just how vulnerable they are to the risks introduced by connected devices in the workplace.

 
Phishing with Dynamite

Phishing with Dynamite

In 2016, phishing not only continued to grow as a cyberthreat, but was deployed more strategically to maximize profit for cybercriminals.