<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=326493627736020&amp;ev=PageView&amp;noscript=1">

Hackers Aren’t Looking For You. That Doesn’t Matter.

I sometimes have to take a step back and remember that not everyone’s LinkedIn feed is filled with cyber insurance companies, digital forensics firms, information security systems providers, and the like. I see news reports on breaches, network extortion attacks, and computer fraud on a daily..

Keep Reading

Point of Sale Systems: An Easy Target?

The popular restaurant chain, Chili’s, is the latest victim of a Cyber breach.  Chili’s parent company, Brinker International, operates over 1,600 restaurants worldwide. In a public statement, the company reported that the data stealing malware attack is still under investigation, but it’s clear..

Keep Reading

Take the Regulators Out to the Ballgame

This week, we celebrate one of the very best days of the year: Opening Day for Major League Baseball. I’m from Milwaukee and grew up going to County Stadium/Miller Park to watch the games. Whenever I’d go, I always admired the catchers. I was impressed by their ability to crouch behind the plate..

Keep Reading

Cyber Risk – What Can We Expect In 2018?

Looking back, 2017 was a big year for cyber-attacks affecting large and small businesses worldwide, government entities, and individual’s private personal information.  Below are some of the large-scale events that you might recall:

Keep Reading

A Phishing Trip You Won’t Soon Forget!

Many contractors enjoy a fishing trip to Canada or up north with family and/or friends to get away and relax. The time away recharges their batteries for what now feels like a year-round busy season.

Keep Reading

There’s Risk in Them Thar Contracts (or Lack Thereof)!

Author: David Kruse

Category: Cyber Liability

If data is the new oil, as one article from The Economist states, then coding is the new construction. If carpenters, bricklayers, and ironworkers built (literally) this country, then developers, network engineers, and computer scientists are building the systems we need for the future. And..

Keep Reading

If You Want to Destroy my Sweater…

…hold this thread as I walk away; so goes the Weezer song.

The LA punk band may not be known for their risk management prowess (shocking, right?), but they were on to something that can be useful in understanding the future of cyber security risk.

Keep Reading

Legislative Brief: HHS Issues HIPAA Cyber Attack Response Checklist




Under the Health Insurance Portability and Accountability Act (HIPAA), a covered entity that experiences a ransomware attack or other cyber-related security incident must take immediate steps to prevent or mitigate any impermissible release of protected health information (PHI). 

Keep Reading

10 Tips to Protect Your Business from Ransomware Attacks

The malicious ransomware called “WannaCry” hit businesses large and small across the globe in 2017With more than 200,000 systems infected in over 150 countries, this large scale virus affected schools, governments, businesses, and even forced emergency rooms to close.

Keep Reading