The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Cyber Threats Hit Home

The breadth of data breaches is widening and now your personal computer network may be a target. Company executives, small business owners, investors, and others who tend to access sensitive or financial data from their home computer or mobile device may be at risk for a personal data breach.

Read More »

Cyber Risk – you should be worried too

Cyber risk has shot up to become the 2nd largest concern for U.S. businesses in 2015 (up from 5th in 2014). Malicious attacks such as computer viruses, banking or financial system hacks, and data breaches can cripple a business’ reputation and financial standing. If your company is not prepared, it may never recover from a serious cyber risk event.

Read More »

Another Cyber Hack Leaves More Questions than Answers

The adage that information is power seems to carry more weight now than ever before. Healthcare is moving towards data driven analytics, mobile banking is hitting its stride, and sports at all levels are utilizing advanced statistics to improve competition. However, one major downfall is that all this data must be stored somewhere, thereby creating a risk of breach to the data holder. Hackers are well aware that information is power and data breaches seemingly occur at non-stop rates.

Read More »

Data Breach – Not “Music” to Sony’s Employees Ears…

The recent cyber security breach to Sony Studios should make companies think more carefully about areas of susceptibility in the company. The focus here is “employee data” – now while this has reverberated in the motion picture industry it should make the average company a bit more cautious with employee data systems.

Read More »

Holiday Time

It’s everyone’s favorite time of year again.  The department stores and commercials have already begun to advertise Christmas gifts, and it is not even Thanksgiving.  As exciting as the holidays can be, we sometimes forget to think about the risks that go hand in hand with  the holiday season, including credit card hacking and fires starting from decorations or cooking.

Read More »
The Far-Reaching Effects of a Cyber Breach

The Far-Reaching Effects of a Cyber Breach

This past Tuesday, The Home Depot announced its 3rd Quarter earnings for 2014, but also warned shareholders that there will be more costs associated with the data breach that was originally announced in September 2014. According to a recent Wall Street Journal article, “the company said the data breach resulted in $28MM of pretax expenses in the most recent period, adding that it estimates the net cost for the year to be $34MM.” Based on various articles that I have reviewed, the retailer carries a $100MM insurance policy for expenses related to the breach. Having read about many other security breaches over the past year and the significant costs associated

Read More »

Phishing Scams: Don’t Get Caught on the Hook

Home Depot’s data breach is the largest retail breach we’ve seen yet. Last week, Home Depot publicly stated that in addition to the 56 million credit card accounts compromised, approximately 53 million e-mail addresses were stolen as well. The issue here isn’t the addresses themselves, but the malicious use the addresses will be put to.

Read More »

Cyber Risk is Real: Fill in Liability Gaps with Insurance

Data breaches are a very serious threat to companies and individuals; their occurrence and impact is increasing drastically year over year. Hackers are looking to steal your financial data, personal information, and intellectual property.  Often, the financial and reputational impact of a breach can be disastrous for an organization.

Read More »

Business or Pleasure? Either Could Become a Nightmare without a Mobile Security Policy.

So you are traveling for business or you have finally scheduled a few days away from the office. You pack your bags and are sure to not forget your mobile phone, tablet, and laptop. Now stop for a second and consider the consequences if one of those devices goes missing, is lost, stolen, or even hacked. How much personal or company data would be at risk? Bank account information, e-mails, contact information, confidential business documents. It’s all there for the taking.

Read More »

Insider IT Threats

IT-related threats originate from multiple angles, all of which require proper attention and application of mitigation techniques. Perhaps the biggest threat to a company’s IT security is their internal contacts (staff, vendors, contractors, etc.). Many companies are utilizing heightened IT security measures, but fail to account for the negligible or malicious actions from these internal contacts who often have high-level access to company systems.  Inside access often isn’t monitored and can easily lead to stolen data or corrupted systems.

Read More »
Logo of als all heals group featuring a blue palette with a stylized "a" and a starburst design.

Subscribe to our Articles

Newsletter Form