Cybersecurity Archive

The Most Common Cyber Claim

The Most Common Cyber Claim

Business email compromise became the most common incident in cyber insurance claims in 2018.

 
The Small Business Cybersecurity Knowledge Gap

The Small Business Cybersecurity Knowledge Gap

Few small business owners have implemented cybersecurity best practices, despite acknowledging the risks.

 
Simplifying Third-Party Risk Management

Simplifying Third-Party Risk Management

These five steps can help companies assess the data security risks of prospective partners.

 
Why Businesses Struggle with Email Security

Why Businesses Struggle with Email Security

Businesses and their employees are more susceptible than they realize to an array of phishing attacks and impersonations because of their blind trust in business communications—particularly email.

 
UK Cybersecurity Office Warns Against Weak Passwords

UK Cybersecurity Office Warns Against Weak Passwords

The National Cyber Security Centre offered password security insights after interviews with more than 2,500 members of the public.

 
The Case for Uniform Data Breach Reporting

The Case for Uniform Data Breach Reporting

By creating clear terms, definitions and regulations on data breach reporting, the United States can gain greater insights on growing and changing cyber threats that companies face across industries.

 
Why GDPR Should Not Stifle Information Sharing

Why GDPR Should Not Stifle Information Sharing

Does the processing and exchange of personal information embedded in some threat information violate GDPR and thus expose companies to severe fines?

 
Facebook Plagued by Recent Security Problems

Facebook Plagued by Recent Security Problems

Cybercriminals are increasingly finding new ways to exploit security vulnerabilities at Facebook, putting the personal data of the social network’s users at risk.

 
Does Attorney-Client Privilege Extend to Penetration Testing?

Does Attorney-Client Privilege Extend to Penetration Testing?

Unaddressed cybersecurity vulnerabilities uncovered by pen testers could become the basis of legal action.

 
Sharing Cybersecurity Responsibility

Sharing Cybersecurity Responsibility

Cybersecurity efforts have traditionally been the responsibility of organizations that hold data, but with so much at stake from a breach, consumers now have a role to play as well.

 
Developing a Formal Cyber Incident Response Plan

Developing a Formal Cyber Incident Response Plan

The prevalence of data breaches and stricter standards and regulations have made cybersecurity incident response plans a necessity for organizations.

 
Mobile Devices: The Next Frontier for Hackers

Mobile Devices: The Next Frontier for Hackers

As more employees use mobile apps for work, IT departments face new security challenges.

 
Getting a Handle on Handheld Risks

Getting a Handle on Handheld Risks

The explosion of mobile and social media risks has had significant implications for insurance coverage.

 
The Cybersecurity Talent Gap

The Cybersecurity Talent Gap

Organizations are facing a shortage of qualified professionals who can address the growing range of cyberrisks.

 
Banks Face New Cybersecurity Rules

Banks Face New Cybersecurity Rules

Updates to the SWIFT transaction network have created compliance challenges for banks.