Stay informed about the trends in the P&C and benefits industries.
Given the rapid growth and the normalization of cannabis as an industry, various operations throughout the cannabis distribution chain continue to face unforeseen financial exposures. This article addresses these exposures and four key areas of professional lines coverage that retail agents should access to ensure that they are offering a complete portfolio of protection to their clients within the cannabis industry.
Social engineers exploit human emotions, rather than using sophisticated software or hacking technology, to bypass the most iron-clad security measures. In the second part of our Social Engineering series, we identify examples of schemes employed by social engineers and how to design and implement comprehensive security practices to mitigate the risk of a loss.
Increased regulations have made pure technological cyber-attacks more difficult and costly, causing cyber criminals to shift their focus to social engineering. Although traditional commercial crime policies contain a computer fraud and funds transfer fraud insuring agreement, courts have generally held that claims arising from incidents where the insured voluntarily transfers funds – many of which arise from social engineering – are not covered. This article examines key court rulings and how to fill in potential coverage gaps.
Every industry has exposure to cyber risks, including transportation and logistics. While these industries worked from paper and wheels for many years, now there are both internal and external networks that are critical to operating in this industry group. This article discusses the unique cyber risks facing the transportation and logistics sector, coverages to address these threats, and proactive cyber risk management tools.
In 2018, companies within the energy sector rely heavily on technology to perform daily operations. With this increased connectivity comes increased cyber risk. As threats continually evolve, it is virtually impossible to adequately prepare for every type of cyber-attack; however, appropriate insurance coverage can play a key role in mitigating risk. This article discusses energy-related claim trends and the value that Cyber Liability policies can add to your coverage offering for energy risks.
As Cyber exposures continue to evolve, it is increasingly important to understand the risks, the potential costs and which type of insurance policy responds.
In the event of a cyber attack, the Directors & Officers (D&O’s) of a company are often held liable. D&O's should ensure they have comprehensive insurance coverage as well as mitigate their cyber liability exposure with these three steps.
In response to the masses becoming more aware of cyber-attack techniques, hackers have countered with more sophisticated attacks, such as CEO Fraud, also known as Social Engineering Fraud. How we do we address this increasing risk as an industry?
The most significant liability threat for companies after a data breach could be from their business partners, including banks and payment card processors. This article details what merchants and their brokers need to know to ensure their coverage matches their needs and expectations.
Cyber Liability coverage is particularly intriguing for financial institutions, as they are held to a higher standard for protecting their customers’ information given their role in protecting their money. To help combat losses associated with data breaches, new cyber insurance products have started to emerge.
There is a tremendous potential risk for merchants when it comes to the fines and penalties associated with data breaches – not to mention the public relations nightmare that could follow. Many insurers are hesitant to provide the capacity that is needed for the exposure that exists. Are your clients aware of the Cyberliability solutions that will cover them in the event of a breach?
When it comes to cyber-crime and massive data breaches, there's one group that has been relatively overlooked when it comes to cyberliability - nonprofits. How would an organization with limited capital protect its infrastructure in the event of a breach?