In an infographic capturing the findings from a sampling of 354 cyber claims in the 2017 NetDiligence® Cyber Claims Study, it highlights the weak links, type of data targeted, and the damages associated with a breach. From those claims—where 343 involved the loss, exposure or misuse of sensitive personal data from a variety of industry sectors—humans were the weak link in the incidents.
Resource Search
For businesses to successfully navigate today’s cyber threats and effectively respond to data security events, understanding the costs associated with a data breach is critical.
Life insurance can play an important role in helping achieve the legacy and financial objectives of an individual or family—especially those with significant taxable estates and illiquid assets such as privately held businesses and real estate.
The frequency and scope of cyberattacks are growing rapidly, with breaches becoming a significant threat to a business’s reputation and sustainability. No industry or business size is immune to a cyberattack, and small and midsize businesses typically face more acute risks. With cyberthreats evolving and becoming more prevalent, what can your organization do to reduce the potential of suffering a cyberattack and hopefully minimize the cost of the incident?
Misperceptions about flood risk have kept many people from buying protection from the National Flood Insurance Program (NFIP) or the private insurance market.
In this session, FOX member and guest security expert, Jordan Arnold of K2, explored the cybersecurity trends and threats families and family offices need to be aware of in 2018, including:Personal cybersecurity trends for 2018The difference between identity theft and privacy theftWhy cybersecurity is also a physical security topicIn addition, Jordan shared the best practices that should be adopted to avert and mitigate cyber threats.
Until recently, many families filled key governance roles associated with their trust and estate planning with trusted friends, colleagues, or advisors who were flattered to be asked and honored to serve.
Bring Your Own Device (BYOD) policies are becoming more and more popular, and with good reason. As the capabilities of tablets and smartphones continue to rapidly expand, the mobility revolution has been a boon for businesses and employees alike, enabling greater productivity and more flexibility. BYOD amplifies those efficiency gains, reducing administrative headaches for the business and encouraging employee participation. The key is to find an appropriate balance that protects the business while allowing employees to take advantage of the technology.
Countless hours are spent training employees to provide excellent service, and it is this helpful nature that con artists use to get privileged information through deception. This tactic is called Social Engineering and can be attempted via any of the ways that people communicate with each other. It is a highly effective weapon in the hacker's arsenal, but there are ways to thwart it.
At the heart of risk management is a gloomy truth: You can never achieve zero risk. In a world of limited resources there are always tradeoffs to be made: how much to invest here and how much there, how much risk to tolerate and how much to mitigate or insure against. To answer those questions, risk quantification is necessary—to estimate how likely an outcome is to occur and more importantly, what will the cost be; translating complex real-world events into dollar figures that can enable rational decision making is critical to effective risk management.