Stranger danger: Keys to avoiding scams & cyber missteps
Consistent training presented in a variety of formats creates an effective strategy for managing cyber risks.
Rising cyberattacks in Japan show how U.S., Europe are also vulnerable
While Japan has its own particular problems with hackers, many of its vulnerabilities are shared by the U.S.
How cyber risks can reshape business interruption coverage
Under Connecticut law, 'actual impairment' could be interpreted to include the reallocation of resources following a cyberattack.
Ransomware-as-a-service tops evolving global cyber risks
Also on the rise: Triple extortion schemes in which cyber criminals exploit multiple ransoms from a single target.
Mobile phishing encounters accelerated in 2022
Since 2021, mobile phishing attacks have increased 10% for enterprise devices and 20% for personal devices.
Managing supply chain cyber risks
There are a number of factors fueling the rise in supply chain attacks, such as victims being more willing to pay ransoms, escalating international tensions, larger and more interconnected networks, and the ease of anonymous payments through cryptocurrency.
Middle-market companies show cybersecurity, coverage deficiencies
Many mid-sized firms lack an incident response plan, but a majority are investing in cybersecurity this year.
Addressing the rising risks in cyber insurance
Review how active scanning and continuous monitoring can improve the loss ratio for cyber insurance.
Cybersecurity is headed for a subtle, but important, evolution
Review the current cybersecurity trends and learn how these risks are becoming more complex.
Embedded insurance and cybersecurity
Tapping into a technology ecosystem offers significant opportunities to reach new customers with innovative, relevant and accessible products.
{ "data": { "slug": "october-is-national-cyber-security-awareness-month", "title": "Cybersecurity Insights", "type": "regulated insights", "packageUrl": "", "summary": "The present is always the perfect time for insurance professionals and insureds to reexamine the ever-evolving cybersecurity landscape.", "cssFile": "", "imageUrl": "", "mediaUrl": "", "blurb": "", "articles": [ { "uri": "/2023/04/18/stranger-danger-keys-to-avoiding-scams-cyber-missteps/", "title": "Stranger danger: Keys to avoiding scams & cyber missteps", "summary": "Consistent training presented in a variety of formats creates an effective strategy for managing cyber risks.", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "tags": [], "prettyDate": "April 18, 2023", "wordcount": "999", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/04/Email-threat_JustSuper_Adobe-Stock.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/04/24/rising-cyberattacks-in-japan-show-how-u-s-europe-are-also-vulnerable/", "title": "Rising cyberattacks in Japan show how U.S., Europe are also vulnerable", "summary": "While Japan has its own particular problems with hackers, many of its vulnerabilities are shared by the U.S.", "byline": "Jamie Tarabay, Min Jeong Lee and Takahiko Hyuga", "kicker": "Market Insights", "tags": [ "licensed-from-bloomberg" ], "prettyDate": "April 24, 2023", "wordcount": "1805", "timeToRead": "10 minute", "readtime": "10", "authors": [ { "webUrl": "/author/profile/jamie-tarabay-min-jeong-lee/", "name": "Jamie Tarabay, Min Jeong Lee" }, { "webUrl": "/author/profile/takahiko-hyuga/", "name": "Takahiko Hyuga" } ], "kickerNode": [ { "uri": "/market-insights/", "sectionName": "Market Insights" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/04/Cyber-attack-Article-202304240741.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/28/the-impairment-of-business-interruption-insurance-414-236019/", "title": "How cyber risks can reshape business interruption coverage", "summary": "Under Connecticut law, 'actual impairment' could be interpreted to include the reallocation of resources following a cyberattack.", "byline": "Eric B. Stern and Jack Eyers", "kicker": "News", "tags": [ "canonical:https://www.law.com/newyorklawjournal/2023/03/24/the-impairment-of-business-interruption-insurance" ], "prettyDate": "March 28, 2023", "wordcount": "1006", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/eric-b-stern/", "name": "Eric B. Stern" }, { "webUrl": "/author/profile/jack-eyers/", "name": "Jack Eyers" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Business-interuption-cyber.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/04/21/ransomware-as-a-service-tops-evolving-global-cyber-risks/", "title": "Ransomware-as-a-service tops evolving global cyber risks", "summary": "Also on the rise: Triple extortion schemes in which cyber criminals exploit multiple ransoms from a single target.", "byline": "Jose Seara", "kicker": "Analysis", "tags": [], "prettyDate": "April 21, 2023", "wordcount": "1006", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/jose-seara/", "name": "Jose Seara" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/04/Cyber-Attack.jpg-image620x372.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/02/mobile-phishing-encounters-accelerated-in-2022/", "title": "Mobile phishing encounters accelerated in 2022", "summary": "Since 2021, mobile phishing attacks have increased 10% for enterprise devices and 20% for personal devices.", "byline": "Steve Hallo", "kicker": "Research", "tags": [], "prettyDate": "March 02, 2023", "wordcount": "361", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/steve-hallo/", "name": "Steve Hallo" } ], "kickerNode": [ { "uri": "/research/", "sectionName": "Research" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Identity-theft-Article-202303020740.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/07/managing-supply-chain-cyber-risks-414-235095/", "title": "Managing supply chain cyber risks", "summary": "There are a number of factors fueling the rise in supply chain attacks, such as victims being more willing to pay ransoms, escalating international tensions, larger and more interconnected networks, and the ease of anonymous payments through cryptocurrency.", "byline": "Michael Orenstein", "kicker": "Commentary", "tags": [ "canonical:https://www.law.com/newyorklawjournal/2023/03/06/managing-supply-chain-cyber-risks" ], "prettyDate": "March 07, 2023", "wordcount": "1252", "timeToRead": "7 minute", "readtime": "7", "authors": [ { "webUrl": "/author/profile/michael-orenstein/", "name": "Michael Orenstein" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Warehouse_2.jpeg-image620x372.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/15/middle-market-companies-show-cybersecurity-coverage-deficiencies/", "title": "Middle-market companies show cybersecurity, coverage deficiencies", "summary": "Many mid-sized firms lack an incident response plan, but a majority are investing in cybersecurity this year.", "byline": "Steve Hallo", "kicker": "Research", "tags": [], "prettyDate": "March 15, 2023", "wordcount": "336", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/steve-hallo/", "name": "Steve Hallo" } ], "kickerNode": [ { "uri": "/research/", "sectionName": "Research" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Hacker-Cybersecurity-Article-202303142003.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/16/addressing-the-rising-risks-in-cyber-insurance/", "title": "Addressing the rising risks in cyber insurance", "summary": "Review how active scanning and continuous monitoring can improve the loss ratio for cyber insurance.", "byline": "Lewis Guignard and Yoshifumi Yamamoto", "kicker": "Expert Opinion", "tags": [], "prettyDate": "March 16, 2023", "wordcount": "677", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/lewis-guignard/", "name": "Lewis Guignard" }, { "webUrl": "/author/profile/yoshifumi-yamamoto/", "name": "Yoshifumi Yamamoto" } ], "kickerNode": [ { "uri": "/expert-opinion/", "sectionName": "Expert Opinion" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Cyber-Security-Article-202303150848.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/28/cybersecurity-is-headed-for-a-subtle-but-important-evolution/", "title": "Cybersecurity is headed for a subtle, but important, evolution", "summary": "Review the current cybersecurity trends and learn how these risks are becoming more complex.", "byline": "Russ Cohen", "kicker": "Commentary", "tags": [], "prettyDate": "March 28, 2023", "wordcount": "904", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/russ-cohen/", "name": "Russ Cohen" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Cybersecurity-Article-202303280750.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/03/31/embedded-insurance-and-cybersecurity/", "title": "Embedded insurance and cybersecurity", "summary": "Tapping into a technology ecosystem offers significant opportunities to reach new customers with innovative, relevant and accessible products.", "byline": "Ben Dulieu", "kicker": "Analysis", "tags": [], "prettyDate": "March 31, 2023", "wordcount": "569", "timeToRead": "3 minute", "readtime": "3", "authors": [ { "webUrl": "/author/profile/ben-dulieu/", "name": "Ben Dulieu" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/Web-tracking-tools_-ArtemisDiana.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/04/04/small-midsize-businesses-still-lack-cybersecurity-hygiene/", "title": "Small, midsize businesses still lack cybersecurity hygiene", "summary": "Businesses might be paying more attention to cybersecurity, but many fail to adopt basic cybersecurity best practices.", "byline": "Dan Palardy", "kicker": "Commentary", "tags": [], "prettyDate": "April 04, 2023", "wordcount": "825", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/dan-palardy/", "name": "Dan Palardy" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/04/Data-Breach.jpg-image620x372.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/04/06/chatgpts-cybersecurity-implications-the-good-the-bad-and-the-ugly/", "title": "ChatGPT's cybersecurity implications: The good, the bad and the ugly", "summary": "Created primarily for conversational use, ChatGPT's versatility has made it an asset in multiple domains, including cybersecurity.", "byline": "Etay Maor", "kicker": "Expert Opinion", "tags": [], "prettyDate": "April 06, 2023", "wordcount": "1156", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/etay-maor/", "name": "Etay Maor" } ], "kickerNode": [ { "uri": "/expert-opinion/", "sectionName": "Expert Opinion" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/ChatGPT_FAMILY-STOCK_Adobe-Stock.jpg", "width": "620", "height": "372" } }, { "uri": "/2023/04/06/chatgpts-cybersecurity-implications-the-good-the-bad-and-the-ugly/", "title": "ChatGPT's cybersecurity implications: The good, the bad and the ugly", "summary": "Created primarily for conversational use, ChatGPT's versatility has made it an asset in multiple domains, including cybersecurity.", "byline": "Etay Maor", "kicker": "Expert Opinion", "tags": [], "prettyDate": "April 06, 2023", "wordcount": "1156", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/etay-maor/", "name": "Etay Maor" } ], "kickerNode": [ { "uri": "/expert-opinion/", "sectionName": "Expert Opinion" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/03/ChatGPT_FAMILY-STOCK_Adobe-Stock.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/10/04/nhtsa-releases-updated-vehicle-cybersecurity-best-practices/", "title": "NHTSA releases updated vehicle cybersecurity best practices", "summary": "The 2022 report leveraged research and industry activity over the last six years to provide updated guidance for how the auto industry can improve vehicle cybersecurity.", "byline": "Brittney Meredith-Miller", "kicker": "Best Practices", "tags": [], "prettyDate": "October 04, 2022", "wordcount": "678", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/brittney-meredithmiller/", "name": "Brittney Meredith-Miller" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/10/Cybersecurity-11.jpeg-image620x372.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/09/29/5-factors-contributing-to-company-cyber-risks/", "title": "5 factors contributing to company cyber risks", "summary": "Conducting a risk assessment can help companies lower their cyber insurance premiums as threats increase.", "byline": "Michelle Drolet", "kicker": "Best Practices", "tags": [], "prettyDate": "September 29, 2022", "wordcount": "864", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/michelle-drolet/", "name": "Michelle Drolet" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/09/Cybersecurity_Miha-Creative.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/09/29/study-top-concerns-for-mid-market-businesses-include-financial-digital-risk/", "title": "Study: Top concerns for mid-market businesses include financial, digital risk", "summary": "In 2022, cyberattacks remained the top concern when it comes to micro risks for mid-sized companies.", "byline": "Brittney Meredith-Miller", "kicker": "Analysis", "tags": [], "prettyDate": "September 29, 2022", "wordcount": "349", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/brittney-meredithmiller/", "name": "Brittney Meredith-Miller" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/09/Risk-management.jpg-image620x372.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/09/16/cyberattacks-are-down-but-small-businesses-becoming-bigger-targets/", "title": "Cyberattacks are down, but small businesses becoming bigger targets", "summary": "The rate of ransomware attacks is slowing as demands go unpaid, according to Coalition.", "byline": "Steve Hallo", "kicker": "Market Insights", "tags": [], "prettyDate": "September 16, 2022", "wordcount": "328", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/steve-hallo/", "name": "Steve Hallo" } ], "kickerNode": [ { "uri": "/market-insights/", "sectionName": "Market Insights" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/09/CYBER-INSURANCE-Article-202209160758.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/09/23/ransomware-protection-for-small-businesses-414-228022/", "title": "Ransomware protection for small businesses", "summary": "Small businesses are often targets of hackers because they have fewer resources in the event of a cyberattack, or that's the common misconception.", "byline": "Andrew Lipton", "kicker": "Best Practices", "tags": [ "canonical:https://www.law.com/dailybusinessreview/2022/09/21/ransomware-protection-for-small-businesses" ], "prettyDate": "September 23, 2022", "wordcount": "974", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/andrew-lipton/", "name": "Andrew Lipton" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/09/Cybersecurity-ransomware-Chananie-copy-767x633.jpg", "width": "767", "height": "633" } }, { "uri": "/2022/09/27/as-war-rages-on-cyber-insurers-war-exclusion-clauses-face-reckoning-414-228267/", "title": "As war rages on, cyber-insurer war exclusion clauses face reckoning", "summary": "As more state actors engage in cyberwarfare, insurance companies and private businesses are struggling to find common ground on what the \"War Exclusion Clause\" means for them.", "byline": "Isha Marathe", "kicker": "News", "tags": [ "canonical:https://www.law.com/legaltechnews/2022/09/26/as-war-rages-on-cyber-insurers-war-exclusion-clauses-face-reckoning" ], "prettyDate": "September 27, 2022", "wordcount": "676", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/isha-marathe/", "name": "Isha Marathe" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/09/Cyber-Attack-767x633-1.jpg", "width": "620", "height": "372" } } ], "navigations": [], "sponsors": [] } }