Businesses have arguably never faced such a breadth of challenges as they do today. Drawing on data and insight from Fitch Solutions, a leading source of independent political, macroeconomic, financial, and industry risk analysis, our Political Risk Map 2019 presents a global view of the issues facing multinational organizations and investors. This...
We have the answers
Search Results
In this webcast, experts from Marsh’s Cyber Practices take a closer look at how changing cyber risk exposures, regulations, and best practices will change the cyber risk management landscape in 2019. Download and view the Cyber Landscape 2019 slides as you listen to the discussion that includes:The impact of new regulations and laws on the wa...
Profound political, economic, societal, technological, and environmental transformations are occurring at an unprecedented scale and have become a part of day-to-day business life. In this 14th edition of the World Economic Forum's Global Risks Report, undertaken with Marsh & McLennan Companies and other partners, we examine the evolving ma...
The sweeping European Union General Data Protection Regulation (EU GDPR) covers any company offering “goods and services” or monitoring behavior of individuals in the EU—even if the company has no physical presence in Europe. With companies facing potential fines of up to 20 million euros or 4 percent of annual revenue, GDPR has c...
This report outlines the key data breach notification laws in every state, as well as Guam, Puerto Rico, and the Virgin Islands. As part of your risk management strategy, use this guide as a map to review state laws, understand key issues and trends, and compare laws among states. For each state, the guide includes personal information definition, ...
New cyber breach scenarios are constantly emerging, and they bring with them a variety of new claims. The fact that there’s no industry-standard cyber policy language makes it a tremendous challenge to ensure your Cyber Risk insurance will really protect you. Insurance oversight can lead to costly consequences. It’s critical to know the...
In a ransomware attack, a hacker penetrates an organization’s network and holds its data hostage until a specified ransom is paid. Hackers don’t discriminate based on business size or industry—any organization that stores its data on a network is at risk. You can protect your business with five best practices.
The cannabis industry is blooming. Market-watchers expect to see double digit sales growth every year through 2022, despite frequent changes in the regulations that govern this rapidly evolving industry. To protect their investments and keep making the bold moves needed to reap the rewards in this high growth industry, cannabis business operators a...
Massachusetts Governor Charlie Baker recently signed House Bill 4806, amending the state’s data breach notification law. In relevant part, the amendment expands the information that must be reported to Massachusetts regulators in connection with a data breach involving the personal information of Massachusetts residents, imposes new requireme...
Due to the evolving sophistication of criminals, security breaches continue to occur on a regular basis. Banks have already been responding to regulator concerns about cybersecurity risks and the potential liabilities and penalties that could result from failure to have an adequate cybersecurity program. If a cyber breach happens, banks will need t...
Prevention matters, and knowledge is the key to prevention. By understanding exactly what identity theft is, how it happens, and how it affects you, you will be better able to prevent and, if necessary, resolve identity theft. Learn more about identity protection and some simple steps you can take to further reduce your susceptibility.
College years can be an exciting time for young adults, as they get their first taste of independence and being self-sufficient. However, the responsibilities of coming-of-age also comes with significant risks. Parents can help their college-bound children by following essential tips on reducing risky driving habits, managing cyber threats, and bui...
Moving from home to college is a rite of passage that requires a teenager to assume more responsibility for their actions and requires a parent to respect their child's budding independence. Before college-bound teens make the move, there are important factors families need to fully consider regarding their children’s personal safety, hea...
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine. With enough policies and procedures in place, Social Engineering Fraud (SEF) is preventable. However, ...
After years of favorable treatment, will insurance carriers finally shift their appetite for this industry? We’ve been fortunate to have a large volume of carriers interested in obtaining asset management business in the past three years. This increased capacity has driven carriers to create enhanced terms and conditions as well as offer more...