Quantcast
Channel: data breach – Central Insurance Companies
Browsing all 15 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Invisible Criminal

I receive e-mails periodically from industry sources that share information on various insurance topics. One thing that’s certain is that communication has changed since I entered the industry. From...

View Article


Image may be NSFW.
Clik here to view.

Responding to a Data Breach: What’s Your Plan?

When the storm sirens sounded last year, I scooped up my 4-year-old grandson and headed for our “safe closet.”  Have you ever sat in a closet with a 4-year-old with the door closed?  I suggest you have...

View Article


Image may be NSFW.
Clik here to view.

The Costly Consequences of Cyber Crime

While sitting in my doctor’s office, I started thinking, “What if?” What if the doctor’s computer network were hacked tonight? Does he have knowledgable I.T. staff protecting the sensitive personal...

View Article

Image may be NSFW.
Clik here to view.

Identity Theft: Yes, It Could Happen to You!

Shortly after the Thanksgiving rush, my daughters and I were watching the news broadcast about the data breach of payment information of 40 million holiday consumers. My number one favorite retailer,...

View Article

Image may be NSFW.
Clik here to view.

Combating the Devastation of a Data Breach

Its 5:42 p.m. on a Friday. John, the owner of a small manufacturing company, is leaving work to meet with Jennifer, his banker, for dinner. After five years in business, John’s company is profitable...

View Article


Image may be NSFW.
Clik here to view.

Don’t Deny the Threat of Denial of Service Attacks

Dawn walked into her office on Black Friday. Thanksgiving had been a lot of fun. It was good to catch-up with the family, some of whom had flown in from different parts of the country. Dawn, the CFO of...

View Article

Image may be NSFW.
Clik here to view.

Does Your Cyber Insurance Have the Right Coverages?

Amanda, only four months on the job as the new risk manager of a large manufacturing company, was walking into a crisis management meeting with the company’s senior leadership. The issue was serious:...

View Article

Image may be NSFW.
Clik here to view.

Defending Against the Scut Farkus of the Internet World

Many of you may remember the V-8 juice commercial where someone forgets their daily dose of tomato-flavored goodness, proceeds to initiate the face palm, and exclaims, “Wow, I could have had a V-8!”...

View Article


Equifax Data Breach Anniversary: Why It’s Time to Check Your Identity Defenses

Greater than 50%. Those are the odds your important personally identifying information (PII) was exposed in the 2017 Equifax data breach. You are forgiven, if the September 2017 announcement of the...

View Article


Protecting Your Identity After a Data Breach

Capital One announced recently that a hacker had accessed the personal information of 100 million individuals in the United States and 6 million in Canada that had applied for credit with the...

View Article

Small Business Saturday – BIG Cyber Protection

Shop Small is a nationwide movement that celebrates small businesses every day and helps communities thrive and stay vibrant. Small Business Saturday is a whole day specially dedicated to supporting...

View Article

Juice Jacking: What You Need to Know

We have probably all been to a public building where there are signs offering a free service to plug in your device at a charging location. Without thinking, we hurriedly plug in our device to the USB,...

View Article

Protect Your Online Retail Business

In my blog post, Protect Yourself While Shopping Online, I shared how to protect yourself as a consumer. Now, let’s talk about protecting your customers and yourself as a business owner. If you have...

View Article


Build a Strong Cybersecurity Culture through Employee Training

  Data breaches, hacks, and email fraud are hitting businesses of all sizes. It’s not just the big corporations like Equifax and Marriott International—all companies need to prioritize cybersecurity....

View Article

New Cyberthreats for 2021…The List Goes On

We recently posted about Deepfakes being a new cyberthreat for 2021. There are a few more threats to be aware of this year, and knowledge about them is the best defense. IoT Hacks  Internet of Things,...

View Article

Browsing all 15 articles
Browse latest View live