Article archive

Does your insurance policy cover your intellectual property?

28/02/2019 17:35
There can often be a disconnect between a company’s management of its IP risks and its other risks. It is rare for risk managers to become involved in evaluating and managing risks related to a company’s IP portfolio, so questions as to whether those risks should be retained, transferred or insured...

How cyber insurance can protect against the new ‘sextortion’ threat

27/02/2019 08:06
A new cyber risk has been threatening companies in recent months, playing into the fears of business owners and employees and trying to blackmail them out of money. International specialist insurer Beazley has reported on an increase of this new threat, dubbed ‘sextortion’. The company’s Breach...

DLA Piper GDPR data breach survey: February 2019

25/02/2019 11:24
On 25 May 2018 new data breach notification laws came into force across Europe which fundamentally changed the risk profile for organizations suffering a personal data breach. Under the EU General Data Protection Regulation - 'GDPR' - personal data breaches which are likely to result in a risk of...

Sextortion and the dark side of the web - Beazley breach insights - February 2019

22/02/2019 10:09
Opportunistic cyber criminals are engaging in a new, darker strain of email compromise by attempting to bribe recipients into paying crypto-currency ransoms using so-called ‘sextortion’ tactics.   A typical case of sextortion investigated by Beazley Breach Response (BBR) Services involves an...

NeuroSOC Malware Analysts Detect Spam Campaign delivering vjw0rm, Duhini and Adwind Remote Access Trojans

17/02/2019 08:49
NeuroSOC, as part of the malware/abuse service that it provides, has recently captured two samples which concern a spam campaign (a DHL General Price Increase e-mail and a DHL Express_Shipment Notification e-mail) that delivers the cross-platform (RAT)...

Business email compromises: 365 days of vigilance

26/01/2019 06:58
The latest threat to cybersecurity isn’t a new form of attack vector — it’s the operational risk that can occur when using Microsoft Office 365 (O365). Research firm Gartner found that 13% of publicly listed companies around the world use Office 365 or Google Apps for email, with 8.5% using the...

Deloitte Report : A new era for privacy

13/01/2019 09:03
General Data Protection Regulation (“GDPR”) six months on Six months on from the General Data Protection Regulation (“GDPR”) coming into force, GDPR is having the desired effect with a largely positive impact on consumer opinion in relation to personal data being collected and...

CFC Underwriting: UK businesses prime target for funds transfer fraud

19/12/2018 07:21
UK cyber policyholders are more than twice as likely as their US counterparts to claim for social engineering-driven attacks It wasn't long ago that it was fairly easy to spot a social engineering scam. Poorly written emails might appear in your inbox, promising a cash prize or sizeable...

GDPR Alert: Santa Claus has been the victim of a cyber attack!!!

07/12/2018 15:16
Santa Claus had been the victim of a significant cyber-attack by hackers who do not love Christmas in order to control the naughty list he maintains with the reasoning for not sending the gifts.    The hackers went further by publishing the list on various websites, blackmailed Santa...

GDPR: more than 8,000 data breaches notified to ICO

07/12/2018 14:07
More than 8,000 data breaches have been reported in the UK since the General Data Protection Regulation (GDPR) took effect in May, the information commissioner has said. Elizabeth Denham revealed the number in a speech in New Zealand earlier this week. The GDPR began to apply on 25 May...
Items: 41 - 50 of 895
<< 3 | 4 | 5 | 6 | 7 >>