The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

A risk management consultant typing on a laptop at a desk, with papers, a pen, earphones, and a plant in the background.

The Unknowns of IT

  Most CEOs or CFOs are probably not Cyber Security experts, but are entrusted to ensure the company runs efficiently and profitably. In today’s business IOT world, having a safe and secure network is a large part of keeping the business operational. This includes ensuring that all cyber related risks are minimized as much as the budget will allow. Cyber related issues that threaten the company’s income are scary for sure, but perhaps the most frightening aspect of keeping your network and data secure are the “unknowns” of IT.

Read More »
A close-up of a keyboard with code and digital data projections overlaying the image.

Will Homeowner’s Insurance Cover a Cyber Attack on Your Personal Information?

These days, with most of us stuck at home and doing the majority of shopping and banking online, the risk of cyber criminals hacking into our networks to get to our bank accounts and/or personal information is greater than ever. While we have made considerable advances in cyber-security, so have the cyber criminals which is one of the reasons we are starting to see insurance policies that protect personal information in the event of a breach. The market for this type of insurance is still new, but it can be quite inexpensive to add cyber protection to homeowner’s policy if the insurer who wrote the policy provides it.

Read More »
A woman with blonde hair diligently focusing on cyber security protocols.

4 Cyber Security Tips for Businesses with Remote Workers

Most companies have been forced to quickly implement a remote work solution that suited essential employees or even the entire firm’s staff. This has exposed many companies network to new risks as everyone has a different set up at home. Some are using MACs, some using PCs, some have outdated operating systems and software while others are already infected with viruses or malware. 

Read More »
Threats to Consider When Crafting a Social Media Risk Mitigation Plan

Threats to Consider When Crafting a Social Media Risk Mitigation Plan

  Over the last decade, social media has quickly become a prominent way for businesses to advertise, communicate, and educate. On the flip side, it can be a huge risk for those businesses that cannot keep up with the ever changing tools and trends in privacy, security, and marketing. We often see businesses and even public figures falling prey to social engineering scams, ransomware, hacking, and a multitude of other cyber risks. Luckily, with some planning and diligence, mitigating these risks can be quite simple. Below are examples of some threats as well as solutions you can implement now that will help protect your business from some of the most

Read More »
Cyber Risk Preparedness

Cyber Risk Preparedness

Given the widespread awareness of Cyber Risk and the increasing trend for companies to consider insurance around this exposure, a company’s preparedness for a Cyber risk related event should be a part of their risk management plan.  Unfortunately, for most organizations, this part of the plan has not been matured. That’s a mistake…

Read More »
Underrated Small Business Threats and How to Safeguard Against Them

5 Underrated Small Business Threats and How to Safeguard Against Them

  Most small business owners have at least some knowledge of the risks they face. Likely their insurance broker has educated them on some basic coverage for workers compensation, property damage, and business interruption to name a few. But several other potential exposures exist that, if left unaddressed, can mean massive and unncessary risk for a small business. As a company grows, so too does its risk. Business owners therefore would be well served to understand exactly what risks they face, how their specific industry affects their situation, and what they can do about it. Never be blindsided by a seemingly unforeseen issue. Visualize worst case scenarios so you can

Read More »
Close-up of hands typing on a laptop keyboard with code displayed on the screen.

Trump’s Cybersecurity Exec Order: Businesses Should Follow the Lead

What does the new order do? On May 11th 2017, President Trump issued the new, signed cyber security executive order that demands each federal agency and department head will be held accountable for cyber security risk to their enterprises; an initiative to better protect the federal government’s critical data and systems. It outlines the cyber-risk reporting requirements that they must adhere to and names the framework that they’ll use as the standard.

Read More »
A world map highlighting locations with a high density of activity in Europe, Russia, India, and parts of North and South America

WannaCry Ransomware Attack: Key Healthcare Data Security Takeaways

Source: The New York Times   Though there’s currently no evidence that patient data was breached in last week’s massive cyber attack on UK hospitals, the news sent shock waves around the globe. The ransomware used in the attack, known as “WanaCrypt0r 2.0” or “WannaCry,” disrupted health services and ambulance transports at several hospitals throughout England.

Read More »
Logo of als all heals group featuring a blue palette with a stylized "a" and a starburst design.

Subscribe to our Articles

Newsletter Form