Diving deep into the metrics from more than 1,270 data security incidents, this one-of-a-kind report features actionable insights and checklists to help companies improve their data security measures and operational resilience. Key findings reveal ransomware remains front and center; companies are becoming more resilient after making investments in...
We have the answers
Search Results
It's no secret that cryptocurrency markets and the larger digital assets economy have been roiled by recent instability, resulting in discussions about how regulatory initiatives, rising inflationary pressure, and public adoption trends will affect industry participants long term. To help navigate this challenging environment, a collection of ...
Employing service providers in your home carries considerable risk. If not handled with extreme care, the process of hiring, termination, and managing day-to-day responsibilities can create liability—and even result in claims of discrimination and retaliation by the employee. This report provides a snapshot of an increasingly complex employment lan...
On August 24, 2022, the California Attorney announced a settlement with Sephora, Inc. that included a fine of $1.2 million for alleged violations of the California Consumer Privacy Act (CCPA). The settlement is important because it makes clear that the use of analytics, advertising cookies, and other automatic data collection technologies are ...
Russia has long been designated as a technologically hostile nation. In the leadup to the conflict with Ukraine, Russia launched unprecedented, but predictable, cyber warfare operations against the Ukrainian government and civilian infrastructure. With the situation on high alert and Russia’s aggressive cyber attacks that go beyond Ukraine, a...
Facing more frequent and intense cyber threats, it’s vital that businesses are prepared for the attacks. In this episode of Marsh’s Risk in Context podcast, learn how organizations can build effective cyber incident and ransomware management plans and the actions they can take before, during, and after an attack. An important piece of y...
When COVID hit, many business owners faced the dire realization that the insurance they paid so much for did not cover the business interruption resulting from the pandemic exposures. To help guard against that type of unexpected disruption in the future, many business owners have set up captives—a lucrative alternative risk financing structu...
In December of 2017, the U.S. Tax Court decided in the Lender Management, LLC v. Commissioner case that deductions that were part of a taxpayer’s trade or business were deductible under Section 162; however, deductions under Section 212 were suspended through tax year 2025. Following the suspension of the 2-percent miscellaneous itemized deduc...
The best time to prepare your home for the cold weather, snowfall, ice accumulation, and storms is before winter sets in. For added protection, recommended tips are provided to help you get a head start.
Winter-related claims add up to over $1 billion each year across the insurance industry. One common—yet often overlooked—cause of costly damage is ice damming. By taking proactive measures and making crucial upgrades to your home, you can help prevent ice damming damage.
Finished basements are at elevated risk during heavy storms, making electronic and recreational equipment, furniture, mechanical systems, and other items susceptible to damage. Basement flooding can be exacerbated by a power failure, which may cause a disruption in water removal systems. One of the best investments to protect against water dam...
Having a good cyber risk management program in place might help a company prevent some breaches. But more importantly, when a breach does happen, it can help companies get back on their feet faster and mitigate financial and reputational damage. How do you know whether your company is doing what it should to address the risk and become cyber resili...
An increasing problem facing employers is the threat of class action lawsuits related to their use of background checks. In these lawsuits, plaintiffs claim that employers are violating a federal statute called the Fair Credit Reporting Act (the “FCRA”), which regulates, among other things, an employer’s use of background checks p...
This report outlines the key data breach notification laws in every state, as well as Guam, Puerto Rico, and the Virgin Islands. As part of your risk management strategy, use this guide as a map to review state laws, understand key issues and trends, and compare laws among states. For each state, the guide includes personal information definition, ...
The sweeping European Union General Data Protection Regulation (EU GDPR) covers any company offering “goods and services” or monitoring behavior of individuals in the EU—even if the company has no physical presence in Europe. With companies facing potential fines of up to 20 million euros or 4 percent of annual revenue, GDPR has c...