The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Illustration of a spotlight labeled "Cyber Spotlight" shining on the word "Healthcare" emphasizing cyber risk.

Cyber Risk – Healthcare Sector Spotlight

As Cyber Risk continues to evolve, it is becoming very evident that while it is spread over a variety of industries, the types of Cyber Risks are specific to each industry and play a major role in their level of exposure. The healthcare sector in particular, is targeted most heavily by hackers and malicious campaigns due to the private nature and black market value of the data. Personally Identifiable Information (PII) and Personal Health Information (PHI) contain data in which a bad actor can easily steal someone’s identity, open false accounts, perform fraudulent transactions, or hack/gain access to bank and other types of private accounts.

Read More »
Crisis Management – More than Just PR

Crisis Management – More than Just PR – It’s Also about Risk

Fake bank accounts, food-borne illnesses, smartphones catching fire, cyber breaches. These are just a handful of recent events that have played out in the news and flooded social media, exponentially effecting conversations, comments and opinions, and most importantly, reputation and revenue. One thing that all of these seemingly different events have in common is that each one can be classified as a crisis, and require a thoughtful and carefully orchestrated response.

Read More »
A graphic with a fishing hook and a fish silhouette says "Phishing Scams" and "Don't Get Caught on the Hook!.

Don’t Be “Phooled” | Phishing Scams Work!

The Personally Identifiable Information (“PII”) of approximately 10,000 past and present employees of Seagate Technology, a leading electronics and data storage solutions manufacturer, was handed over freely to cybercriminals. The information included W-2 forms, names of beneficiaries, social security numbers of employees and spouses, etc. Needless to say, the impacted people are not thrilled and have brought suit against Seagate for malpractice and a lack of regard for employees affected by the negligent handling of data.

Read More »
The image features three red squares with the text "Enterprise Risk Management (ERM).

Third-Party Risk – Are Your Contracts and Connections Top of Mind?

The non-core activities of your firm can get in the way of serving your customers. Third parties, including outsourcers, can provide some relief from that distraction, but the administrative load does not completely dissolve. Some smart monitoring and evaluation will go a long way toward protecting your firm’s interests.

Read More »
Ransomware Events are on the Rise | Protect your Networks Now

Ransomware Events are on the Rise | Protect your Networks Now (Part 1)

The U.S. Department of Justice stated that “More than 4,000 ransomware attacks have occurred daily since January 1, 2016. This is a 300 percent increase over the approximately 1,000 attacks per day seen in 2015.” Essentially, no particular user, company or business sector is safe. Although the Healthcare and Retail industries are targeted for their volume and value of data, home computers may also fall victim to ransomware.

Read More »
A smartphone with a padlock icon covers the screen of a tablet displaying various application icons.

Leaving on a Jet Plane? Secure Your Devices First

I’ve headed off on vacation with my wife and kid in sunny Florida, but didn’t want to miss posting something useful for Cyber Tuesday.  Having been preaching the “dos” and “don’ts” of data security for businesses, I had to make sure my own mobile devices were secured while on the move.  My wife will probably disagree, but, in my opinion securing your data (both personal and professional) while on the go is just as, if not more important than making sure you packed your toothbrush and sunscreen.

Read More »
The Importance of Password Diversity

The Importance of Password Diversity

Between company logins, online banking, personal email accounts, and various social media accounts the average user is required to come up with a lot of passwords. Unfortunately, many use the same password for all of their logins, simply for the sake of convenience. This poses a huge security risk, as once any one of those services is hacked and the user’s password becomes compromised, all of the other accounts are in jeopardy.

Read More »
A computer screen displays a chilling message with the caption "RANSOMWARE 2.0" indicating a dangerous ransomware attack.

Just Wait … It Gets Worse | the Sequel to Ransomware

Cisco has released the 2016 Midyear Cybersecurity Report and their findings point to future, more sophisticated types of ransomware that will take full advantage of systems with less than satisfactory security measures, patching practices, and detection rates.

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content