Cyber-Risk

The Rise of Ransomware

The Rise of Ransomware

Ransomware attacks have quadrupled in 2016, and many industries are seeing a significant uptick in hacking and malware attacks.

 
Technology-Sharing Is Critical in Preventing Fraud

Technology-Sharing Is Critical in Preventing Fraud

The rapid growth of fraud-related activity reinforces the need for aggressive prevention strategies and new technology to prepare for emerging threats.

 
Cybersecurity Concerns in M&A Due Diligence

Cybersecurity Concerns in M&A Due Diligence

Cyberrisks pose an increasingly important due diligence area in mergers and acquisitions.

 
Five Third-Party Cybersecurity Myths

Five Third-Party Cybersecurity Myths

Third-party relationships create some of the hardest-to-manage cyberrisks in any industry.

 
EU Firms Complacent on Cyberrisk

EU Firms Complacent on Cyberrisk

While the vast majority of large businesses report suffering a breach, many are notably unprepared—and unconcerned—looking forward.

 
The Persistence of Paradoxical Password Problems

The Persistence of Paradoxical Password Problems

Password security has never been more important, yet many people have still not adjusted their behavior accordingly.

 
Hack the Vote: Cyberrisk at the Ballot Box

Hack the Vote: Cyberrisk at the Ballot Box

As Americans prepare for the election in November, many experts worry that hackers could be heading for the voting booth as well.

 
Protecting Critical Infrastructure From Cyberattack

Protecting Critical Infrastructure From Cyberattack

Organizations need to take measures to protect physical operations from cyberattacks.

 
5 Cybersecurity Mistakes That Lead to Regulatory & Legal Action

5 Cybersecurity Mistakes That Lead to Regulatory & Legal Action

Hacking incidents can often result in regulatory penalties and class action lawsuits.

 
Risk Management Issues on the Ballot

Risk Management Issues on the Ballot

The outcome of this year’s elections will have implications for key risk management issues.

 
4 Steps to Successful Security Training

4 Steps to Successful Security Training

By improving training efforts, companies can increase employee awareness of cyberrisk.

 
Securing Coverage for Cyberattacks

Securing Coverage for Cyberattacks

Risk professionals must closely review their first-party coverage for business income losses.

 
Cybersecurity Misconceptions

Cybersecurity Misconceptions

Cybercrime is a booming business, but many companies are still operating under many misconceptions about cyberthreats.

 
How to Use Analytics to Enhance Security

How to Use Analytics to Enhance Security

Advanced analytics tools can help companies identify complex IT security threats more quickly.

 
The Costs of Low-Tech Hacking

The Costs of Low-Tech Hacking

The rise of ransomware attacks show are evidence that even low-tech hacking can pay dividends.