Massachusetts Governor Charlie Baker recently signed House Bill 4806, amending the state’s data breach notification law. In relevant part, the amendment expands the information that must be reported to Massachusetts regulators in connection with a data breach involving the personal information of Massachusetts residents, imposes new requireme...
We have the answers
Search Results
Due to the evolving sophistication of criminals, security breaches continue to occur on a regular basis. Banks have already been responding to regulator concerns about cybersecurity risks and the potential liabilities and penalties that could result from failure to have an adequate cybersecurity program. If a cyber breach happens, banks will need t...
Prevention matters, and knowledge is the key to prevention. By understanding exactly what identity theft is, how it happens, and how it affects you, you will be better able to prevent and, if necessary, resolve identity theft. Learn more about identity protection and some simple steps you can take to further reduce your susceptibility.
College years can be an exciting time for young adults, as they get their first taste of independence and being self-sufficient. However, the responsibilities of coming-of-age also comes with significant risks. Parents can help their college-bound children by following essential tips on reducing risky driving habits, managing cyber threats, and bui...
Moving from home to college is a rite of passage that requires a teenager to assume more responsibility for their actions and requires a parent to respect their child's budding independence. Before college-bound teens make the move, there are important factors families need to fully consider regarding their children’s personal safety, hea...
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine. With enough policies and procedures in place, Social Engineering Fraud (SEF) is preventable. However, ...
After years of favorable treatment, will insurance carriers finally shift their appetite for this industry? We’ve been fortunate to have a large volume of carriers interested in obtaining asset management business in the past three years. This increased capacity has driven carriers to create enhanced terms and conditions as well as offer more...
According to the 2018 Global Risks Report, cybercrime is the top risk for business leaders in advanced economies, as well as the risk most likely to intensify. In fact, with the rising frequency of data breaches, cyber risk is now a common exposure for individuals, families, family offices, and their related enterprises. To help you assess your cyb...
The past couple of years have proven to be banner years for private equity and merger and acquisition activity, with no signs of slow down in 2019. With cash on hand to invest and the increase in Representation and Warranty Insurance policies, forecasters expect these trends to continue. Podcast host Michael Cohen is joined by Luca Salvi to discuss...
The financial damages of cyber crime are projected to reach $6 trillion annually by 2021—more than double those same figures from 2015. That’s why it’s important to not only stay on top of the latest trends in the cyber security industry, but to also stay ahead of them. In this issue of Cyber InFocus, you will learn about the Biom...
Whether an employee leaves for another job or because the employer decided it was time for the employee to go, employers typically need to figure out how to replace a departing worker. Sometimes, the break is clean. Other times, it can be complicated. Regardless of the reason or circumstance, now-former employees may have post-employment obligation...
The trend of states legalizing both medical and recreational marijuana use continues to gain momentum. Unfortunately for employers, this also means having to wade through an ever-growing patchwork of marijuana laws across the country. The latest development addresses one discrete but important distinction for recreationally legalized marijuana. Emp...
Ransomware has become prevalent and can cause significant downtime and leaving businesses with no choice but to pay the ransom. The bad actors aren’t just trying to steal personal, identifiable information but are frequently monitoring email correspondence to manipulate invoices and redirect payroll to accounts they control. Employee training...
Employers of all sizes inadvertently put themselves at risk by not having a policy establishing how long to continue benefits during a leave of absence (LOA). So, before the important questions arise, employers should establish an LOA Policy that considers employee needs, carrier contractual provisions, federal and state benefit regulations, and th...
With the implementation of California Consumer Privacy Act (CCPA) set to go into effect January 1, 2020, anyone doing businesses with California residents should not only be preparing their digital strategies to comply with the new law, they should also be assessing their risk and reviewing their cyber insurance and adequacy of limits. Why? Now, at...