Networks - Data Security/Technology

AIG
Wednesday, May 23, 2018

In business-owning families, personal and business risks are often blended and are typically managed by different people and processes. This creates a gap in identifying risks and solutions that can be addressed through a holistic and collaborative risk management approach.

Hemenway & Barnes
Monday, April 30, 2018

Every year during tax season the Internal Revenue Service (IRS) releases the “Dirty Dozen” list of tax scams. With the increased number of data breaches, it is important to remain vigilant when sharing your personal data and responding to demands for tax payments.

Koley Jessen
Friday, April 27, 2018

No matter where your business is located or operating, if your company suffers a data breach you may have legal compliance and reporting obligations or face possible fines and lawsuits.

Dan A. Bailey, Esq., Bailey Cavalieri and Chubb Personal Risk Services
Thursday, April 12, 2018

Cyber risk has become a major potential loss exposure for almost any company. As with any other exposure, directors should confirm that reasonable steps are taken to identify, mitigate, respond to, and recover from third parties relating to cyber-related problems when they arise.

Chubb Personal Risk Services
Monday, April 9, 2018

Global Mergers and Acquisitions (M&A) transactions tallied up to an impressive $678.5 billion in deal value in the first quarter of 2017, up by 8.9 percent year over year, according to Mergermarket’s most recent estimates.

Chubb Personal Risk Services
Friday, April 13, 2018

More than half of the time, cyber criminals’ search leads them directly to small and midsize enterprises (SMEs), who can be hacked with ease and offer a substantial cumulative payoff—in the form ransom money, stolen credit card numbers, or bank account information.

Baker & Hostetler
Wednesday, April 4, 2018

Many entities face the same types of security incidents, and some handle an incident well while for others it’s a disruptive and costly one. The entities that fare better have prepared for an incident and use lessons-learned from prior incidents.

Daimon Geopfert, RSM
Monday, April 2, 2018

RSM
Monday, April 2, 2018

In an infographic capturing the findings from a sampling of 354 cyber claims in the 2017 NetDiligence® Cyber Claims Study, it highlights the weak links, type of data

by Sean Renshaw, RSM
Monday, March 26, 2018

The frequency and scope of cyberattacks are growing rapidly, with breaches becoming a significant threat to a business’s reputation and sustainability. No industry or business size is immune to a cyberattack, and small and midsize businesses typically face more acute risks.