Close

Articles Posted in Cybersecurity

Updated:

Avoiding a Cyber Mouse Trap: Three Common Cyber Insurance Pitfalls

Almost four months have passed since the World Health Organization declared COVID‑19 a global pandemic on March 11, 2020. Continued social distancing and other precautionary measures have driven many organizations to expand work-from-home protocols for the foreseeable future or even permanently—in turn prompting many organizations to review their cyber insurance…

Updated:

Insurance Implications of Transitioning to a Remote Workforce

A couple months into the widespread shift to remote work for many employees on a temporary basis, an increasing number of companies are considering or already implementing a permanent shift to remote work for most or all of their employees. Unsurprisingly, this shift is rapidly occurring in the technology industry.…

Updated:

Insurance for Heightened Cyber Risk in the COVID-19 Era

A few months into the COVID-19 pandemic, the insurance focus (understandably) has been on business interruption and event cancellation coverage. Various other coverages are in play as well, given the types of COVID-19-related claims and lawsuits being filed (and that will be filed in the future) against corporate policyholders, from…

Updated:

Cyber Coverage by any Other Name Can Smell as Sweet: Maryland Court Rules Traditional Property Policy Covers Loss of Data and Impaired Computer Equipment After Ransomware Attack.

Cyberattacks are an increasingly frequent and costly risk faced by almost every business today. While the availability and scope of cyber-specific insurance has developed exponentially over the past few years, it is important to remember that more traditional policies (such as general liability and first-party property insurance) can still be…

Updated:

When International Tensions Raise Insurance Risk

Recent headlines have raised significant concerns about the possibility of cyberattacks on U.S. businesses as a result of the heightened tensions with Iran. The Department of Homeland Security, through its Cybersecurity and Infrastructure Security Agency (CISA), has published alerts and guidance recommending heightened awareness and vigilance. In “International Pressure Raises…

Updated:

How the “Name-and-Shame Game” Highlights the Need of Electric Utilities for Appropriate Cyber Insurance

In late August, the Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) issued a joint white paper proposing a “name-and-shame” approach to electric utilities that failing to meet NERC Critical Infrastructure Protection (CIP) Reliability Standards. The standards represent a baseline for protecting against cyber-attacks on critical…

Updated:

As Investment in Esports Grows, Insurance Coverage Must Keep Up

Packed stadiums? Check. Players and teams with huge followings? Check. Massive social media appeal? Check. But here, the events that spectators are so eager to attend aren’t live basketball or football games. Instead, fans are lining up to watch others competitively play video games, more commonly known as esports. In…

Updated:

From Data Breach to Bankruptcy – A Cautionary Tale for Those Without Cyber Insurance

A data breach may cost a company millions in recovery and liability damages, but rarely does a breach force a company into bankruptcy. However, a months-long data breach at American Medical Collection Agency (AMCA) in 2018-2019 did just that, forcing its parent company, Retrieval-Master Creditors Bureau Inc., into Chapter 11…

Updated:

Financial Institutions Face Potential New Cybersecurity Standards from the Fed

Recently, the Board of Governors of the Federal Reserve System has indicated it may move forward with enhanced cybersecurity standards for large financial institutions and the third-party vendors that serve them. Over on Pillsbury’s SourcingSpeak blog, colleagues Andrew L. Caplan and Curtis A. Simpson examine just what those standards might be in…

Updated:

The Missing Piece of the Cyber Response Plan Puzzle – The Insurance Component

Experts are full of advice about the importance of designing and implementing a robust cyber breach response plan. They opine frequently on its key components, such as identifying the roles and responsibilities of the response team, steps for investigating and containing the breach, internal and external communications regarding the breach…