The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

6 Strategies to Mitigate Cyber Risk in the Healthcare Sector

6 Strategies to Mitigate Cyber Risk in the Healthcare Sector

The healthcare sector is without a doubt one of the most targeted industries for cyber hackers. Different industries have different types and degrees of cyber risk exposure. But hackers and malicious campaigns take aim at the healthcare sector in particular due to the private nature and black market value of the data.

Read More »
A laptop screen displays an orange envelope with a black paper showing a skull and crossbones, indicating a malware or virus threat.

Should You Pay Ransomware? No, Do These 6 Things Instead

Ransomware strikes. Your critical data files have been encrypted and your business grinds to a halt. Do you: a) spend countless hours rebuilding from backups (if you were diligent enough to ensure they’ll work) or b) pay the perpetrator to unlock your files? Now that ransomware is spreading like wildfire through malicious emails, “malvertising” campaigns, and exploit kits, many firms and individuals face this exact scenario.

Read More »
4 Ways to Evaluate and Mitigate Your Company's Cyber Risk management

4 Ways to Evaluate and Mitigate Your Company’s Cyber Risk

Globalization and dependence on the internet for data storage over the past decade has exposed companies to a whole new set of risks. As this trend continues, so too does the risk associated with breaches of domestic or international servers. Massive data breaches happen with alarming frequency. In the past few years, there have been several high profile attacks affecting companies like:

Read More »
6 Ways to Teach Your Employees to Safeguard Your Data

6 Ways to Teach Your Employees to Safeguard Your Data

This is an actual picture I took in a café of an unattended pile of documents marked “Confidential.” It blew my mind. If only this employee’s C.E.O. or C.O.O. could see this obvious disregard for the material’s confidentiality. Anyone could have grabbed the documents, peaked at the data, or… snapped a photo.

Read More »
Illustration of a clipboard with a checklist. perfect for organizing tasks like securing small business insurance.

3 Things Small Firms Should Do Before Shopping for Cyber Insurance

Cyber risk continues to evolve at a breakneck pace. Insurers are working to keep up by customizing policies and endorsements based on the size and business model of the insured. At last week’s third annual International Cyber Risk Management Conference, Matthew Davies, Assistant Vice President of Chubb Insurance Company of Canada, outlined a few key points on what cyber security practices a small organization to already have in place when looking to procure cyber insurance.

Read More »
A close-up of a server rack with multiple blue network cables connected highlights the importance of cyber risk management.

How to Respond to a Cyber Attack: 7 Crucial Steps

 In 2015 The Internet Crime Complaint Center received 288,012 complaints of cyber attacks totaling more than $1.07 billion in reported losses. Those numbers are based only on incidents that were reported to the FBI. When we talk about cyber risk, data theft, and the threat of Ransomware, we usually focus on prevention strategies. But being prepared to respond quickly and efficiently when an event does occur is just as important to operations recovery, cost reduction, and reputation management.

Read More »
Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Four Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Most companies today opt to distribute their employees’ W-2 tax forms electronically; either through email or some type of download service. Because these forms contain a good deal of Personally Identifiable Information (“PII”), such as name, address, social security number and salary information – cyber thieves are using several simple, yet, tried-and-true methods to fraudulently obtain them.

Read More »
A person in a white shirt uses a magnifying glass to read a document on cyber liability insurance at a desk, with a pair of glasses placed nearby.

Reviewing Cyber Breach Insurance Coverage | First-Party Costs

Organizations today must regard cyber breaches not as a possibility, but as an inevitable fact of life. In this environment, it’s crucial to have a cyber liability insurance policy that adequately covers the potential loss and offers payment or reimbursement for response costs. Understanding what’s covered by the policy well before a breach occurs and building that knowledge into your company’s incident response plan is critical.

Read More »
Logo of als all heals group featuring a blue palette with a stylized "a" and a starburst design.

Subscribe to our Articles

Newsletter Form