Security

Do Your Records Put Your Business at Risk?

Do Your Records Put Your Business at Risk?

Companies can reduce the impact of cyberattacks by having a clear understanding of what type of records they are collecting and storing.

 
How to Manage Personal Device Risk

How to Manage Personal Device Risk

New corporate security policies can help protect against mobile device vulnerabilities.

 
Inside New York’s Cyber Regulation

Inside New York’s Cyber Regulation

A new cybersecurity law establishes specific requirements for financial services companies.

 
Improving Health Care Cybersecurity

Improving Health Care Cybersecurity

Regulators and health care providers alike must do more to secure patient data.

 
How to Comply with New York’s Cybersecurity Regulation Without Breaking the Bank

How to Comply with New York’s Cybersecurity Regulation Without Breaking the Bank

With New York’s new cybersecurity regulation, smaller financial services enterprises must quickly organize, assess and secure their infrastructure.

 
The Strengths and Weaknesses of Country Risk Maps

The Strengths and Weaknesses of Country Risk Maps

While country risk maps can be used as the basis for a number of important decisions, the way they are created can reveal flaws.

 
Cyber Scorekeepers

Cyber Scorekeepers

A growing number of ratings firms aim to help companies and their insurers assess and manage cybersecurity risks.

 
Will Your Crime Insurance Cover Cyber?

Will Your Crime Insurance Cover Cyber?

Courts are divided over whether crime insurance policies provide coverage for cyber-related fraud.

 
Cybercrime Costs Businesses $11.7 Million Per Year

Cybercrime Costs Businesses $11.7 Million Per Year

The annual costs of cybercrime, number of breaches, and mitigation time to resolve them are all on the rise.

 
The Global Economy’s New Frontiers

The Global Economy’s New Frontiers

While operating and investing in emerging markets poses substantial risks, companies can increase their chances for success through robust preparation and contingency planning.

 
Bridging the Security Gap in the Internet of Things

Bridging the Security Gap in the Internet of Things

Developing an effective security strategy for internet of things product development and use requires adhering to certain best practices.

 
Grid: Locked — Managing the Risks of Hacking the Electric Grid

Grid: Locked — Managing the Risks of Hacking the Electric Grid

As more hackers focus on critical infrastructure, risk managers and consumers must prepare for the risks of cyberattacks on the electric grid.

 
The Risks of Voice Technology

The Risks of Voice Technology

Voice-enabled devices have become increasingly popular, but adopting this technology also means introducing new risks.

 
Enhancing Security with Big Data Analytics

Enhancing Security with Big Data Analytics

Security information systems need improvement in order to keep up with today’s rapidly evolving cyberthreat landscape.

 
Key Considerations for Cyberrisk Coverage

Key Considerations for Cyberrisk Coverage

A number of insurance policy provisions can help ensure adequate protection from cyber losses.