The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Cyber Risk | Retail Sector Spotlight

Cyber Risk | Retail Sector Spotlight

It doesn’t take a cyber risk expert to realize that the retail industry is a prime target for hackers, and that some of retail’s most iconic brands have made front-page, breaking news when it comes to millions of lost or stolen data records. Primary Cardholder Information (PCI) is extremely valuable amongst those on the “Darknet,” once described by PC Magazine as “the hidden, anonymous underbelly of the searchable Web.” Since larger retailers handle these records in the hundreds of thousands to millions, hackers are looking for any entry point into their networks to extract credit card and customer account data.

Read More »
Yellow folder labeled "Request for Proposal" with papers inside and a pen resting on it.

Choosing the Right Broker – Have You Considered A Broker RFP?

There may be a number of times that you’ve considered evaluating your company’s insurance broker for various reasons, including: Ensuring a sense of confidence and peace of mind that the broker who is working with you is, in fact, working in your best interests and delivering the best solutions for your firm’s coverage; Conducting your standard vendor evaluation, or; You are frankly not satisfied with your current insurance broker’s services and looking to identify alternatives.

Read More »
Best Practices for Mitigating FCPA Risk management

Best Practices for Mitigating FCPA Risk

The stepped-up enforcement of the Foreign Corrupt Practices Act (FCPA) has introduced a number of middle market companies to the vagaries of the language in the Act. It was written to cast a very wide net and intended to be a looming force over U.S. companies that do business in foreign markets.

Read More »
Illustration of a spotlight labeled "Cyber Spotlight" shining on the word "Healthcare" emphasizing cyber risk.

Cyber Risk – Healthcare Sector Spotlight

As Cyber Risk continues to evolve, it is becoming very evident that while it is spread over a variety of industries, the types of Cyber Risks are specific to each industry and play a major role in their level of exposure. The healthcare sector in particular, is targeted most heavily by hackers and malicious campaigns due to the private nature and black market value of the data. Personally Identifiable Information (PII) and Personal Health Information (PHI) contain data in which a bad actor can easily steal someone’s identity, open false accounts, perform fraudulent transactions, or hack/gain access to bank and other types of private accounts.

Read More »
Crisis Management – More than Just PR

Crisis Management – More than Just PR – It’s Also about Risk

Fake bank accounts, food-borne illnesses, smartphones catching fire, cyber breaches. These are just a handful of recent events that have played out in the news and flooded social media, exponentially effecting conversations, comments and opinions, and most importantly, reputation and revenue. One thing that all of these seemingly different events have in common is that each one can be classified as a crisis, and require a thoughtful and carefully orchestrated response.

Read More »

Conforming D&O Coverage for FCPA Protection – Navigating Limits and Opportunities

When looking for coverage for Foreign Corrupt Practices Act (FCPA) costs, the Directors and Officers (D&O) Policy is often the first stop. It appears to be the policy most applicable, because it defends against complaints of wrongdoing. However, to get significant protection from FCPA costs a D&O policy has to be significantly modified. Just by the moniker, Directors and Officers Policy, you know that the coverage is intended to be limited to a collection of individuals running the entity, not the entity itself. The first modification to look for is “Side C” coverage or the equivalent language indicating that the entity will be covered in the case of FCPA matters.

Read More »
A graphic with a fishing hook and a fish silhouette says "Phishing Scams" and "Don't Get Caught on the Hook!.

Don’t Be “Phooled” | Phishing Scams Work!

The Personally Identifiable Information (“PII”) of approximately 10,000 past and present employees of Seagate Technology, a leading electronics and data storage solutions manufacturer, was handed over freely to cybercriminals. The information included W-2 forms, names of beneficiaries, social security numbers of employees and spouses, etc. Needless to say, the impacted people are not thrilled and have brought suit against Seagate for malpractice and a lack of regard for employees affected by the negligent handling of data.

Read More »
Close-up of insurance documents with a section labeled "Liability Coverage" and a pen resting on top.

Is Faulty Workmanship an Insurable Event? The New Jersey Supreme Court Says “Yes.”

The New Jersey Supreme Court recently reversed its position on coverage for construction defects, affirming the Appellate Division’s decision that consequential damages caused by a subcontractor’s faulty workmanship constituted “property damage” caused by an “occurrence” under the plain language of the developer’s Commercial General Liability (CGL) policy.

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content