<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=326493627736020&amp;ev=PageView&amp;noscript=1">

A Phishing Trip You Won’t Soon Forget!

Many contractors enjoy a fishing trip to Canada or up north with family and/or friends to get away and relax. The time away recharges their batteries for what now feels like a year-round busy season.

Keep Reading

There’s Risk in Them Thar Contracts (or Lack Thereof)!

Author: David Kruse

Category: Cyber Liability

If data is the new oil, as one article from The Economist states, then coding is the new construction. If carpenters, bricklayers, and ironworkers built (literally) this country, then developers, network engineers, and computer scientists are building the systems we need for the future. And..

Keep Reading

If You Want to Destroy my Sweater…

…hold this thread as I walk away; so goes the Weezer song.

The LA punk band may not be known for their risk management prowess (shocking, right?), but they were on to something that can be useful in understanding the future of cyber security risk.

Keep Reading

Legislative Brief: HHS Issues HIPAA Cyber Attack Response Checklist




Under the Health Insurance Portability and Accountability Act (HIPAA), a covered entity that experiences a ransomware attack or other cyber-related security incident must take immediate steps to prevent or mitigate any impermissible release of protected health information (PHI). 

Keep Reading

10 Tips to Protect Your Business from Ransomware Attacks

The malicious ransomware called “WannaCry” hit businesses large and small across the globe in 2017With more than 200,000 systems infected in over 150 countries, this large scale virus affected schools, governments, businesses, and even forced emergency rooms to close.

Keep Reading

Take the Regulators Out to the Ballgame

This week, we celebrated one of the very best days of the year: Opening Day for Major League Baseball. I’m from Milwaukee and grew up going to County Stadium/Miller Park to watch the games. Whenever I’d go, I always admired the catchers. I was impressed by their ability to crouch behind the..

Keep Reading

Are You at Risk for Cyber Extortion?

What would you do if someone claimed to have accessed your customers’ private data and threatened to release the information unless you paid them $100,000? 

Keep Reading

PCI Fines/Penalties Coverage can be Critical for the Hospitality Industry

The hospitality industry is often thought of as one of the most attractive targets for a data breach. It doesn’t take much thought to understand why: the sheer volume of credit card and personally identifiable information that runs through restaurants, bars, hotels, etc, is daunting. When you..

Keep Reading

Cyber Risk - No Longer the Stuff of Hollywood

It’s been truly astounding to watch cyber risk develop over the past few years. What started as risk surrounding the loss of private, mostly financial, data, has evolved into a risk encompassing everything from extortion to potential bodily injury and property damage.

Keep Reading

Drones Are Causing Businesses More Risks . . .

Unmanned aerial drones, also called unmanned aircraft systems (UAS), are a new type of aircraft that has broad commercial and personal uses. UAS can be used to inspect buildings, deliver materials or fly around as simple, recreational products. However, as UAS become more advanced and..

Keep Reading