Cyber Insurance
How to protect your business against “Smishing”
Most businesses and individuals are familiar with phishing, which entails cybercriminals leveraging fraudulent emails to manipulate recipients into sharing sensitive information, clicking malicious links or opening harmful attachments. While these scams remain a pressing concern, a new form of phishing—known as smishing—has emerged over the years. WHAT IS SMISHING? Smishing relies on the same tactics…
Read MoreCyber Attacks – A Growing Business Interruption Threat
When you think about what usually causes a business interruption, natural disasters such as fires, earthquakes and floods probably come to mind first. These events can physically damage your property and equipment, making your workspace unusable for a time. The damages from Hurricane Katrina and Superstorm Sandy are great examples of how a natural disaster…
Read MoreWhat is Business Email Compromise (BEC)?
Business email compromise (BEC) is a form of phishing that occurs when a cybercriminal impersonates a legitimate source to trick employees into wiring money, sharing sensitive information or engaging in other compromising activities. Unlike more traditional phishing attacks that target a large group on individuals, BEC attacks are crafted to appeal to specific individuals –…
Read MoreCommon Types of Construction Insurance
As contractors, it’s important to understand what types of insurance your business should have and why. You work hard – make sure you’re properly covered for unforeseen circumstances that could harm your business. Check out this list of recommended insurance policies: Workers’ compensation—Workers’ compensation covers work-related employee injuries or illnesses. While injuries are infrequent, they…
Read MoreCyberthreats in Construction
Incidents involving ransomware and other types of malware have reached epidemic proportions over the past few years, and the construction industry has absorbed more than its share of the damage. A recent study by Safety Detectives found that construction was the third-most targeted industry in North America in 2021, with 13.2 percent of all attacks.…
Read MoreCallback Verification: What it is and Why You’ll Need it
Cybercrime comes in so many variations that it’s hard to keep up: Phishing, spear phishing, smishing, whaling, pharming … it’s enough to make your head spin. All have one thing in common, though, and that’s an attempt by a cyber thief to separate your business from its money by pretending to be someone else. The…
Read MoreCyber Liability Insurance: More than Ransomware
When you think of cyber liability coverage for your business, you probably think of ransomware attacks, and with good reason: Ransomware incidents have spiked over the past few years, as have the associated costs. In many cases the actual ransom amount, steep though it may be, pales in comparison to the associated costs of recovery…
Read MoreCyber Security for Small Businesses
Despite significant cyber security exposures, 85% of small business owners believe their company is safe from hackers, viruses, malware or a data breach. This disconnect is largely due to the widespread, albeit mistaken, belief that small businesses are unlikely targets for cyber attacks. In reality, data thieves are simply looking for the path of least…
Read MoreRisk Management – Retail Operations
Owning and operating a retail store can be a fulfilling experience. Years of hard work, risk-taking and financial investments have allowed you to turn your dreams of opening a store of your own into a reality. Depending on the specific type of store you manage, there are a number of exposures to consider, including risks…
Read MoreLeading the Way: Ransomware Attacks in Manufacturing
For all the concerns about the manufacturing sector and how it’s been affected by supply chain issues, there is one area where manufacturing leads all other industries: ransomware attacks. According to Advisen loss data, ransomware attacks in manufacturing doubled from 2019 to 2021, making it the most targeted industry. This marks a shift from previous…
Read More