The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Illustration of a pizza with a slice being pulled out, accompanied by the text "Pizza Lovers Cyber Breach".

Grab a Slice – Lose Your Data | CiCis Pizza Data Breach

Another hack of a big name corporation has hit the news. CiCis Pizza the victim this time. Over 135 CiCis locations were hit with malware on their Point of Sale (“POS”) system, causing a breach of customer credit card numbers. After several locations reported issues with their POS system, the POS vendor began an investigation that uncovered malware that had been present on some systems as far back as July 2015. A statement on the CiCis website notes: “Not all payment cards used at the affected restaurant locations were compromised; however, some information from some payment cards used in such locations may have been accessed by the malware.” – Not

Read More »
A baseball is depicted behind black vertical bars, creating the appearance that it is imprisoned or confined.

Major League Strikeout | MLB Hacker Sentenced

Former Major League Baseball director of scouting for the St. Louis Cardinals, Christopher Correa, has been sentenced to 46 months in prison for hacking the scouting records and email system of the Houston Astros. Correa “repeatedly viewed confidential information” on the Astros scouting database using “sophisticated means” to hide his identity. Correa’s actions violated the “Computer Fraud and Abuse Act” Federal Law, which prohibits unauthorized access into another business’s computer with the intent to steal data from that computer. Hence, the lengthy sentence. However, the important piece of information to note here is how Correa gained access to the Astros database.

Read More »
A screenshot of the Pokémon GO game showing a Charmander on a sidewalk.

“Gotta Catch em All” – Pokemon Go’s Huge Cyber Vulnerability

The Pokemon Go phenomena is real. Players of the mobile device augmented reality “scavenger hunt” app are out on the streets in droves hunting down Pikachu, Psyduck, Bulbasaur, Charmander and other elusive Nintendo based cartoon characters. Chances are you or someone you know is playing the game…don’t lie, you’re playing it aren’t you? The mobile game developed by Nintendo partner Niantic has caused Nintendo’s stock to jump 36% adding $7 billion to its market cap.

Read More »
A smartphone illustration with a red bug icon displayed on the screen, indicating a software or security issue.

Is Your Mobile Device Putting Your Company at Risk?

Are you addicted to your mobile device? Most of us are. Everything is a tap or swipe away. You can check account balances, pay bills, order from online stores, deal with business email and documents, etc… Essentially, mobile devices allow you to manage your life untethered. Hackers realize that too and are targeting mobile devices more than ever.

Read More »
A magnifying glass highlights the words "NOT COVERED" on a document, emphasizing the exclusions listed in your cyber insurance policy.

Cyber Coverage – What’s Missing in Your Policy?

In several of my most recent “Cyber Tuesday” posts, I’ve discussed the importance of developing a comprehensive cyber risk mitigation strategy which includes IT security measures, well thought out incident response, business continuity documentation and cyber insurance. A recent ransomware event at the University of Calgary shifted the focus to the cyber insurance.

Read More »
A yellow folder labeled "Cyber Incident Response Plan" lies on a desk near a computer keyboard.

Cyber Breach! – Now what?

When addressing cyber risk and the threat of ransomware most of the time we focus on prevention and mitigation strategies. However, being prepared to respond quickly and efficiently when an event does occur is just as important to operations recovery, cyber event cost reduction, and brand/reputation protection. Having a well-defined, documented, and regularly tested Incident Response Plan (“IRP”) that aligns with your Disaster Recovery/Business Continuity Plan (“BCP”) can help your organization to recover from and remain operational during a cyber breach event.

Read More »

3rd Party Cyber Risk – Are You Covered?

When considering cyber related risk, many would often think, “How could my organization’s system be breached?” Hopefully, they plan some defense for their server being hacked and purchase Cyber Liability Insurance that covers first party loss. This is all well and good, but it is important to consider the exposure when storing data with an off-site storage provider or granting system access to a vendor/provider of any kind. What if they are hacked?

Read More »

Cyber Liability – Traditional Insurance Policies May Offer Coverage

As it stands today securing a cyber liability policy is almost mandatory for organizations who store any client/customer related data or connect to the internet… which is almost everyone at this point. However, when a cyber breach or related claim occurs, looking to your traditional policies to provide coverage may be worthwhile.

Read More »

The Internet of Everything – Managing Cyber Risk in 2016

The recently released study by PWC has identified Cybercrime as 2016’s second most reported economic crime. Organizations believing they may have minimal exposure or immunity to cyber risk is unfortunately wishful thinking thanks to the “Internet of Things” (“IoT”). Firewalls, security rules, and best practices may protect you against conventional security vulnerabilities, but the periphery devices that make up the internet of things open up a new set of cyber risks.

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content