Fraud

Turning to Crime Insurance Policies for Phishing Losses

Turning to Crime Insurance Policies for Phishing Losses

When a loss from a phishing attack occurs, employers should promptly consider all of their insurance coverage, including their crime insurance policies.

 
Understanding the Risk of “Immutable” Blockchain Applications

Understanding the Risk of “Immutable” Blockchain Applications

Blockchain has some powerful advantages, but a database that cannot be edited and software that cannot be turned off present unique and potentially troubling risks. 

 
Exporting Risk

Exporting Risk

Export transactions require careful monitoring and due diligence to ensure compliance with federal law.

 
Making Employees More Cyber-Aware

Making Employees More Cyber-Aware

Companies need to put the proper measures in place to provide comprehensive cyber education.

 
Insuring Marine Cargo Against Fraudulent Documentation

Insuring Marine Cargo Against Fraudulent Documentation

Commercial shipping faces a new and daunting set of technological exposures, including the computer-enabled falsification of shipping documents

 
Fighting Fraud with Digital Verification Tools

Fighting Fraud with Digital Verification Tools

As breaches expose ever more customer data, companies will need new security strategies.

 
Global Fraud Incidents on the Rise

Global Fraud Incidents on the Rise

As incidents continue to rise, the lines between forms of fraud are increasingly blurred.

 
Gone Phishing

Gone Phishing

More than three-quarters of organizations experienced a phishing attack in 2017.

 
2018 Cyberrisk Landscape

2018 Cyberrisk Landscape

Cybersecurity is the most dynamic risk for organizations to manage. Stay ahead of the curve with these 10 key trends that will define the threat landscape.

 
Will Your Crime Insurance Cover Cyber?

Will Your Crime Insurance Cover Cyber?

Courts are divided over whether crime insurance policies provide coverage for cyber-related fraud.

 
The Risks of Voice Technology

The Risks of Voice Technology

Voice-enabled devices have become increasingly popular, but adopting this technology also means introducing new risks.

 
Identifying an Embezzler

Identifying an Embezzler

Five common characteristics of embezzlers can help companies reduce the risk of employee theft.

 
Insuring Against Social Engineering Attacks

Insuring Against Social Engineering Attacks

Two key legal decisions have helped clarify social engineering coverage conditions.

 
Fighting Bribery and Corruption

Fighting Bribery and Corruption

A plurality of risk and compliance professionals believe the top risk to their anti-bribery and corruption program will come from third parties.

 
W-2 Phishing Scam Targets Tax Season

W-2 Phishing Scam Targets Tax Season

Fraudsters are using business email compromise techniques to steal W-2 information.