The Invisible Criminal
I receive e-mails periodically from industry sources that share information on various insurance topics. One thing that’s certain is that communication has changed since I entered the industry. From...
View ArticleResponding to a Data Breach: What’s Your Plan?
When the storm sirens sounded last year, I scooped up my 4-year-old grandson and headed for our “safe closet.” Have you ever sat in a closet with a 4-year-old with the door closed? I suggest you have...
View ArticleThe Costly Consequences of Cyber Crime
While sitting in my doctor’s office, I started thinking, “What if?” What if the doctor’s computer network were hacked tonight? Does he have knowledgable I.T. staff protecting the sensitive personal...
View ArticleIdentity Theft: Yes, It Could Happen to You!
Shortly after the Thanksgiving rush, my daughters and I were watching the news broadcast about the data breach of payment information of 40 million holiday consumers. My number one favorite retailer,...
View ArticleCombating the Devastation of a Data Breach
Its 5:42 p.m. on a Friday. John, the owner of a small manufacturing company, is leaving work to meet with Jennifer, his banker, for dinner. After five years in business, John’s company is profitable...
View ArticleDon’t Deny the Threat of Denial of Service Attacks
Dawn walked into her office on Black Friday. Thanksgiving had been a lot of fun. It was good to catch-up with the family, some of whom had flown in from different parts of the country. Dawn, the CFO of...
View ArticleDoes Your Cyber Insurance Have the Right Coverages?
Amanda, only four months on the job as the new risk manager of a large manufacturing company, was walking into a crisis management meeting with the company’s senior leadership. The issue was serious:...
View ArticleDefending Against the Scut Farkus of the Internet World
Many of you may remember the V-8 juice commercial where someone forgets their daily dose of tomato-flavored goodness, proceeds to initiate the face palm, and exclaims, “Wow, I could have had a V-8!”...
View ArticleEquifax Data Breach Anniversary: Why It’s Time to Check Your Identity Defenses
Greater than 50%. Those are the odds your important personally identifying information (PII) was exposed in the 2017 Equifax data breach. You are forgiven, if the September 2017 announcement of the...
View ArticleProtecting Your Identity After a Data Breach
Capital One announced recently that a hacker had accessed the personal information of 100 million individuals in the United States and 6 million in Canada that had applied for credit with the...
View ArticleSmall Business Saturday – BIG Cyber Protection
Shop Small is a nationwide movement that celebrates small businesses every day and helps communities thrive and stay vibrant. Small Business Saturday is a whole day specially dedicated to supporting...
View ArticleJuice Jacking: What You Need to Know
We have probably all been to a public building where there are signs offering a free service to plug in your device at a charging location. Without thinking, we hurriedly plug in our device to the USB,...
View ArticleProtect Your Online Retail Business
In my blog post, Protect Yourself While Shopping Online, I shared how to protect yourself as a consumer. Now, let’s talk about protecting your customers and yourself as a business owner. If you have...
View ArticleBuild a Strong Cybersecurity Culture through Employee Training
Data breaches, hacks, and email fraud are hitting businesses of all sizes. It’s not just the big corporations like Equifax and Marriott International—all companies need to prioritize cybersecurity....
View ArticleNew Cyberthreats for 2021…The List Goes On
We recently posted about Deepfakes being a new cyberthreat for 2021. There are a few more threats to be aware of this year, and knowledge about them is the best defense. IoT Hacks Internet of Things,...
View Article