Archive For The “Technology” Category

Retail Risk Insights: Protect Your Online Retail Network

By | April 25, 2014

With the increasing popularity of smartphones and tablets, access to online shopping websites is only a fingertip away for most consumers. Online retailers can expect $327 billion in sales annually by 2016; but this growth comes at a price. The online retail industry is an increasingly attractive target for major cyber attacks. The results—including tarnished […]

Read more »

Cyber Risks & Liabilities: Complying with HIPAA

By | April 25, 2014

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) addresses the privacy of individuals’ health information by establishing a federal standard concerning the privacy of health information and how it can be used and disclosed. Background As health care institutions began storing larger volumes of private health data digitally, the need to protect this […]

Read more »

Cyber Risks & Liabilities: Defining, Identifying, and Limiting Cyber Crime

By | April 25, 2014

A vast amount of information is now stored on computer servers and databases, and it’s growing every day. Because that information has great value, hackers are constantly looking for ways to steal or destroy it. Cyber crime is one of the fastest growing areas of criminal activity. It can be defined as any crime where: […]

Read more »

Cyber Risks & Liabilities: Securing Your Company’s Mobile Devices

By | March 10, 2014

Because of the convenience they offer, smartphones and tablet devices have become a ubiquitous presence in the modern business world. As usage soars, it becomes increasingly important to take steps to protect your company from mobile threats, both new and old. The need for proper phone security is no different from the need for a […]

Read more »

Cyber Risks & Liabilities: Preventing Laptop Theft

By | March 10, 2014

Laptop computers are integral devices in the workforce today. As more and more companies issue laptops to employees, the chances of losing a laptop (and the data stored on it) to theft are much greater. Follow these guidelines to help keep your laptops safe. Communicate Employee Responsibility If your company issues laptops to employees, be […]

Read more »

Cyber Risks & Liabilities: Four Components of Cyber Risk Management

By | March 10, 2014

If your company stores data and information digitally, you should have a cyber risk management program that addresses prevention, disclosure, crisis management and insurance coverage in the event of a data breach. Good cyber risk management requires the planning and execution of all four of these components. Develop Strategies to Prevent a Data Breach Your […]

Read more »

Cyber Risks and Exposures for Law Firms

By | March 10, 2014

Gone are the days when only the desktop computer in your office is at risk for a data breach. Technology changes quickly, and the latest developments are used in law firms today more than ever before. Information is stored electronically and accessed from laptops, tablets, smartphones, cloud computing systems, and USB or flash drives. Risks […]

Read more »

Cyber Risks & Liabilities: Protecting Against Online Fraud

By | February 27, 2014

While computers have improved the speed and efficiency of how we work, they have also allowed thieves and con artists an easier avenue by which to steal from people and businesses. One of the ways these cyber criminals use computers to steal is through online fraud, one of the fastest-growing crimes today.   Types of […]

Read more »

Cyber Risks & Liabilities: Privacy and Cyber Security

By | February 27, 2014

With the enormous amount of sensitive information stored digitally, companies need to take the proper measures to ensure this data is never compromised. Ultimately, it is the responsibility of business owners to protect their clients’ data. Failing to do so can result in a data breach, which costs companies billions of dollars every year. Understanding […]

Read more »

Cyber Risks & Liabilities: Four Components of Cyber Risk Management

By | February 27, 2014

If your company stores data and information digitally, you should have a cyber risk management program that addresses prevention, disclosure, crisis management and insurance coverage in the event of a data breach. Good cyber risk management requires the planning and execution of all four of these components.   Develop Strategies to Prevent a Data Breach […]

Read more »