Menu

Travelers who check into hotels may run into some uninvited guests in the form of hackers looking to steal their financial information, analysts warn.http://www.businessinsurance.com/article/20170919/NEWS06/912315920/Hotel-industry-fights-constant-hacker-exposures-Wi-Fi-payment-cards?utm_campaign=BI20170919BreakingNewsAlert&utm_medium=email&utm_source=ActiveCampaign

 

We are happy to announce a new partnership with CyberScoutTM, a leading provider of identity and data breach defense services, for our Allied Reinsurance Company (ARC) program, which reduces the risks related to cyber crime for our clients. Captive carriers accounted for about half of the personal lines market in 2016 and according to a 2016 survey by the Captive Insurance Companies Association (CICA), cyber risk is the number one emerging risk cited by captive insurance company owners and the number one non-traditional risk.http://mailchi.mp/b4be79c8df73/new-partnership-with-cyberscout?e=0f58a45b50

 

 

(Reuters) -Banks are increasingly turning to insurance to protect their capital from "operational risks" like cyber attacks and rogue traders, and insurers say they can help safeguard lenders by providing an extra layer of expertise.http://www.businessinsurance.com/article/20170830/NEWS06/912315509/Insurers-see-more-demand-from-banks-for-cover-against-cyber-attacks-rogue-staff?utm_campaign=BI20170830DailyBriefing&utm_medium=email&utm_source=ActiveCampaign

 

 

(Reuters) - A U.S. judge said Yahoo must face nationwide litigation brought on behalf of well over 1 billion users who said their personal information was compromised in three massive data breaches.https://www.reuters.com/article/us-verizon-yahoo-breach/yahoo-must-face-litigation-by-data-breach-victims-u-s-judge-idUSKCN1BB25Q

 

During a July 26, 2017 hearing before the U.S. House of Representatives Small Business Committee, Chairman Rep. Steve Chabot (R-Oh.) stated that cyber threats have become a critical concern for the country’s 28 million small businesses, with the Justice Department recording nearly 300,000 cybersecurity complaints in 2016 alone.http://www.cutimes.com/2017/07/28/us-house-talks-cyber-insurance-threats-business-r?page=1&slreturn=1504021261

 

BURLINGTON, Vt. — Covering cyber risk in a captive insurer is not for every company, but it’s an option that every captive owner should explore, according to experts. http://www.businessinsurance.com/article/20170811/NEWS06/912315127/Captive-insurers-seen-as-viable-option-for-covering-cyber-risk?utm_campaign=BI20170811BreakingNewsAlert&utm_medium=email&utm_source=ActiveCampaign

 

Protecting trade secrets has become more challenging in the cyber age, analysts say, and the loss of trade secrets can cause serious — sometimes permanent — damage to a company.http://www.businessinsurance.com/article/20170808/NEWS06/912315014/Trade-secret-risks-a-challenge-in-evolving-cyber-age?utm_campaign=BI20170808RiskManagement&utm_medium=email&utm_source=ActiveCampaign

 

A federal appeals court has reinstated a putative class action lawsuit filed by health insurer CareFirst Inc. customers in connection with a 2014 data breach, holding their potential risk of injury from the breach is “substantial.”http://www.businessinsurance.com/article/20170801/NEWS06/912314862/Data-breach-class-action-against-health-insurer-CareFirst-reinstated

 

Law360, Los Angeles (August 2, 2017, 10:17 PM EDT) -- A Michigan federal judge ruled Tuesday that Travelers doesn't have to cover a tool manufacturer's losses from an email-based theft scheme, giving insurers more ammunition to argue that computer fraud insurance doesn't apply to multistep scams and deepening a divide among the nation's courts on the scope of such policies.https://www.law360.com/insurance/articles/950528/travelers-win-deepens-divide-over-computer-fraud-coverage?nl_pk=d0a96663-dfd2-44eb-80db-7e18d6ac47b9&utm_source=newsletter&utm_medium=email&utm_campaign=insurance

 

by
|
In the neonatal intensive care unit of Cook Children's Hospital in Fort Worth, Texas, a father is rocking a baby attached to a heart monitor. http://www.npr.org/sections/health-shots/2017/07/26/539290596/hospitals-face-growing-cybersecurity-threats

In the neonatal intensive care unit of Cook Children's Hospital in Fort Worth, Texas, a father is rocking a baby attached to a heart monitor. http://www.npr.org/sections/health-shots/2017/07/26/539290596/hospitals-face-growing-cybersecurity-threats

The WannaCry worm is still alive. Honda said this week that it was forced to halt production for one day at its Sayama plant near Tokyo after finding the WannaCry ransomware in its computer network. https://www.forbes.com/sites/peterlyon/2017/06/22/cyber-attack-at-honda-stops-production-after-wannacry-worm-strikes/#6fc68b195e2b

The recent “WannaCry” cyberattack affected hundreds of thousands of computers around the world. The attack targeted organizations of every type, including hospitals, government agencies, and corporations, freezing computers and locking out users until they paid a “ransom” to release their data. http://www.cobizmag.com/Trends/Ransomware-is-on-the-rise-What-is-it-and-how-to-protect-your-company/

The United States again confronts the grim challenge of managing technological advances and their implications for warfare (as it has several times since, from chemical weapons to missiles to drones). Today, cyberweapons are nearly as synonymous with military power as fighter jets. What’s more, as demonstrated by the recent New York Times report on the cyberattacks used to disrupt North Korean ballistic missile tests and the latest WikiLeaks claims about a CIA hacking unit, cyber capabilities are too tempting for governments to refrain from using — even in peacetime. http://www.vox.com/the-big-idea/2017/3/27/15052422/cyber-war-diplomacy-russia-us-wikileaks

New documents from WikiLeaks point to an apparent CIA program to hack Apple's iPhones and Mac computers using techniques that users couldn't disable by resetting their devices. Security experts say the exploits are plausible, but suggest they pose little threat to typical users. They say that many of the tricks are older — the iPhone hack involves the 3G model from 2008, for instance. The techniques also typically require physical access to devices, something the CIA would use only for targeted individuals, not a broader population. http://abcnews.go.com/Technology/wireStory/wikileaks-cia-hacks-apple-devices-persist-46331776

  • HAVE A QUESTION?

    Fill out this form and let us know.

  • CONTACT US

  • Tel: 208-424-2249
    Fax: 208-944-3146

    9AM - 5PM Monday-Friday

    1112 W. Main St. Ste. 105
    Boise, ID 83702

  • © 2017 STRATEGIC RISK ALTERNATIVES | financial security + risk management + middle market companies | site design by V-Squared Creative