Cyber-Risk

Brandjacking on Social Media and Beyond

Brandjacking on Social Media and Beyond

Companies must monitor their social and online presence for potential reputational risks.

 
The Challenges of Third-Party Data Protection

The Challenges of Third-Party Data Protection

Companies must take steps to safeguard data stored by third-party vendors.

 
The EU-US Data Privacy Bridge Takes Shape

The EU-US Data Privacy Bridge Takes Shape

In the midst of trans-Atlantic controversies about data protection, a group of privacy experts is attempting to iron out the differences between data protection standards in the United States and the European Union.

 
IT Execs Doubt Their Companies’ Data Security

IT Execs Doubt Their Companies’ Data Security

A quarter of security and IT executives worldwide would not trust their own company to store and manage their personal data.

 
Cybersecurity Planning Up, But Training Lags

Cybersecurity Planning Up, But Training Lags

Businesses still are not doing enough to prepare for a cybersecurity crisis.

 
Are Your Tech Products Setting You Up for Exposure?

Are Your Tech Products Setting You Up for Exposure?

While large, household-name companies are often the focus of publicity when a data breach occurs, the tech companies that provided the system may also be liable.

 
Securing Insurance for Cyberbreach Investigations

Securing Insurance for Cyberbreach Investigations

Insurance can help offset the enormous costs of a data breach investigation.

 
New Ransomware and Cyberextortion Schemes Hold Businesses Hostage

New Ransomware and Cyberextortion Schemes Hold Businesses Hostage

CryptoLocker is only one of many new cyberextortion schemes.

 
The Real Risks of Virtual Reality

The Real Risks of Virtual Reality

Facebook’s purchase of Oculus VR promises to usher in a new era for virtual reality, but these opportunities come with a new set of risks.

 
Combating the Evolving Malware Threat

Combating the Evolving Malware Threat

Today’s advanced malware is increasingly rendering traditional protective measures ineffective.

 
Hacking the Hackers

Hacking the Hackers

Companies are adopting more aggressive legal and technological strategies to fight hackers.

 
Captive Use for Cyberrisk Low

Captive Use for Cyberrisk Low

Few organizations use their captive insurer to cover cyberrisks.

 
Users Not Grasping Social Media Risks

Users Not Grasping Social Media Risks

Most customers enjoy a false sense of security when it comes to social media risk.

 
What to Consider When Buying Cyberinsurance

What to Consider When Buying Cyberinsurance

Understanding insurance coverage details is an important element of any cybersecurity program.

 
Building a Better BYOD Strategy

Building a Better BYOD Strategy

Corporate owned, personally enabled technology policies offer both security and flexibility.