Ransomware Risk: Things To Know

Ransomware is a type of malware that encrypts files on a victim’s computer, making them inaccessible. The attackers then demand a ransom payment in exchange for the decryption key. The Department of Homeland Security (DHS) and the Department of Justice (DOJ) offer a resource, StopRansomware.gov, to help businesses mitigate their ransomware risk. The site provides … Read more

Does Your Cyber Insurance Cover Risk from Pixels & Biometrics?

It should but may not, according to this report. There’s legal risk from pixels and biometrics. Pixels track users’ online activities and are the source of growing litigation, including large class actions against Meta. Biometrics support useful security technologies, but often require written consent from users, who may also need to be informed about the … Read more

Cyber Insurance Sunday:

Here at Cyber Insurance News, we focus on just that, Cyber Insurance. But we want to introduce topics and stories adjacent to insurance that focus on helping you understand the scope of the threat cyber crimes present. To that end, most Sundays, we are going to offer something a little outside our focus. But, we … Read more

Cyber Fraud Common in Mortgage Closings, But Most Banks Not Confirming Their Settlement Agents Have Cyber Insurance

A survey of almost 50,000 mortgage settlement agents indicates wire/cyber fraud is common in the mortgage process. While most agents say they have insurance to cover the risk, they also report banks usually do not require evidence of that insurance before engaging with them. This despite the risk to lenders of losing their money in … Read more

Cyber Insurance And Quantum Computing – The New Risk

Quantum computing is a rapidly developing field with the potential to revolutionize many industries. But revolution isn’t always for the good. It also poses serious security risks and businesses need to reexamine their cyber insurance protection. Quantum computers can break current encryption algorithms, which could allow hackers to access sensitive data. They could also be … Read more

×