Cyber-Risk

“Like” It or Not: How Social Media Can Lead to Litigation

“Like” It or Not: How Social Media Can Lead to Litigation

From claims investigations and debt collections to employment practices liability and libel claims, social media might get you sued.

 
Understanding Cyberterrorism

Understanding Cyberterrorism

Before companies and governments can protect their networks from attack, they must understand the nature of the threat.

 
The First Steps to Managing Cyber-Risk

The First Steps to Managing Cyber-Risk

Data breaches and cyberattacks are not IT risks. They are business risks. Follow these steps to ensure your protection is up to snuff.

 
Preparing to Deal with Digital’s Looming Dark Side

Preparing to Deal with Digital’s Looming Dark Side

IT and business are now inextricably interwoven. But it is clear that cyber-risk has become the digital revolution’s menacing dark side

 
Preventing Fraud Without Curbing Commerce

Preventing Fraud Without Curbing Commerce

Online fraud prevention can reduce losses, but how do you use it without alienating impatient consumers?

 
Big Data and Risk Management

Big Data and Risk Management

The financial services industry provides lessons on how to prevent “Big Data” from becoming a big problem.

 
How to Buy Cyberinsurance

How to Buy Cyberinsurance

The cyberinsurance market is highly competitive, so one insurer may offer coverage others won’t. Before you buy or renew a policy, follow these 10 guidelines.

 
Reputation Risk is the Biggest Threat Companies Face from Social Media

Reputation Risk is the Biggest Threat Companies Face from Social Media

Two-thirds of respondents to a recent survey believe that social media is either a critical or significant risk to their organization’s reputation.

 
Q&A: Cloud Security

Q&A: Cloud Security

How can companies ensure that their data is safe in a virtual environment that is beyond their control?

 
Preparing for the Payment Processing Switch

Preparing for the Payment Processing Switch

Retailers have until 2015 to update their credit card processing technology. Procrastination will be costly.

 
BYOD: The Risks of Bring Your Own Device

BYOD: The Risks of Bring Your Own Device

Five things to keep in mind when it comes to employees using their own hardware in the workplace.

 
An Anonymous Threat

An Anonymous Threat

A look at a few of the lesser-known, though still noteworthy attacks by one of the world’s most feared hacker groups.

 
Boards Asleep at the Wheel on Cyber-Risk

Boards Asleep at the Wheel on Cyber-Risk

“There is a whole universe of potential cyber-risk not understood at a board level,” says an insurance industry insider.

 
Four IT Security Trends to Master

Four IT Security Trends to Master

Corporate data is falling into the hands of hackers at an alarming rate. Here are four ways to protect it.

 
Creating a Data-Driven Culture

Creating a Data-Driven Culture

Analytics turned the Oakland A’s from a joke to a contender. How your company can follow suit.