The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Aerial view of a construction site at the intersection of Little West 12th Street and 9th Avenue, showing a collapsed area

When Construction Shortcuts Become Criminal

Take a casual stroll in Manhattan and you can’t help but notice that construction is booming. Cranes, scaffolding, and sidewalk sheds are everywhere. And this isn’t just a New York City phenomenon. Ground-up construction and renovation projects are picking up all across the country. Low interest rates and favorable building conditions are resulting in a surge in real estate & development projects.

Read More »
6 Strategies to Mitigate Cyber Risk in the Healthcare Sector

6 Strategies to Mitigate Cyber Risk in the Healthcare Sector

The healthcare sector is without a doubt one of the most targeted industries for cyber hackers. Different industries have different types and degrees of cyber risk exposure. But hackers and malicious campaigns take aim at the healthcare sector in particular due to the private nature and black market value of the data.

Read More »
A hand in a white shirt executing risk treatment by stopping a line of falling dominoes on a white surface.

ERM | RISK TREATMENT

In our latest posts on Enterprise Risk management (ERM), we addressed the three phases of Risk Assessment: Risk Identification and Risk Analysis and Risk Evaluation. In this post, we turn our attention to Risk Treatment.

Read More »
A laptop screen displays an orange envelope with a black paper showing a skull and crossbones, indicating a malware or virus threat.

Should You Pay Ransomware? No, Do These 6 Things Instead

Ransomware strikes. Your critical data files have been encrypted and your business grinds to a halt. Do you: a) spend countless hours rebuilding from backups (if you were diligent enough to ensure they’ll work) or b) pay the perpetrator to unlock your files? Now that ransomware is spreading like wildfire through malicious emails, “malvertising” campaigns, and exploit kits, many firms and individuals face this exact scenario.

Read More »
4 Ways to Evaluate and Mitigate Your Company's Cyber Risk management

4 Ways to Evaluate and Mitigate Your Company’s Cyber Risk

Globalization and dependence on the internet for data storage over the past decade has exposed companies to a whole new set of risks. As this trend continues, so too does the risk associated with breaches of domestic or international servers. Massive data breaches happen with alarming frequency. In the past few years, there have been several high profile attacks affecting companies like:

Read More »
6 Ways to Teach Your Employees to Safeguard Your Data

6 Ways to Teach Your Employees to Safeguard Your Data

This is an actual picture I took in a café of an unattended pile of documents marked “Confidential.” It blew my mind. If only this employee’s C.E.O. or C.O.O. could see this obvious disregard for the material’s confidentiality. Anyone could have grabbed the documents, peaked at the data, or… snapped a photo.

Read More »
One person hands an insurance contract highlighting the importance of risk management.

Certificate of Insurance Compliance: Eliminating the Blind Spots

Errors and even outright fraud in certificates of insurance is a growing problem. We encounter a 70% noncompliance rate on initial documents. The certificate of insurance compliance function protects a company by ensuring that its contractors have appropriate types and amounts of insurance coverage. The burden of this compliance process is often underestimated.

Read More »
A computer monitor displaying a webpage is being examined by a magnifying glass

3 Emerging Risks That All Businesses Face in 2017

Last month, Risk.net, a UK-based website that covers operations risk at financial services firms, released its list of top 10 operational risks for 2017. It’s no surprise that financial services companies face many of the same risks that businesses in all industries face. So what are those top three risks and how can organizations combat them?

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content