The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

The Far-Reaching Effects of a Cyber Breach

The Far-Reaching Effects of a Cyber Breach

This past Tuesday, The Home Depot announced its 3rd Quarter earnings for 2014, but also warned shareholders that there will be more costs associated with the data breach that was originally announced in September 2014. According to a recent Wall Street Journal article, “the company said the data breach resulted in $28MM of pretax expenses in the most recent period, adding that it estimates the net cost for the year to be $34MM.” Based on various articles that I have reviewed, the retailer carries a $100MM insurance policy for expenses related to the breach. Having read about many other security breaches over the past year and the significant costs associated

Read More »

Phishing Scams: Don’t Get Caught on the Hook

Home Depot’s data breach is the largest retail breach we’ve seen yet. Last week, Home Depot publicly stated that in addition to the 56 million credit card accounts compromised, approximately 53 million e-mail addresses were stolen as well. The issue here isn’t the addresses themselves, but the malicious use the addresses will be put to.

Read More »

Cyber Risk is Real: Fill in Liability Gaps with Insurance

Data breaches are a very serious threat to companies and individuals; their occurrence and impact is increasing drastically year over year. Hackers are looking to steal your financial data, personal information, and intellectual property.  Often, the financial and reputational impact of a breach can be disastrous for an organization.

Read More »

Business or Pleasure? Either Could Become a Nightmare without a Mobile Security Policy.

So you are traveling for business or you have finally scheduled a few days away from the office. You pack your bags and are sure to not forget your mobile phone, tablet, and laptop. Now stop for a second and consider the consequences if one of those devices goes missing, is lost, stolen, or even hacked. How much personal or company data would be at risk? Bank account information, e-mails, contact information, confidential business documents. It’s all there for the taking.

Read More »

Insider IT Threats

IT-related threats originate from multiple angles, all of which require proper attention and application of mitigation techniques. Perhaps the biggest threat to a company’s IT security is their internal contacts (staff, vendors, contractors, etc.). Many companies are utilizing heightened IT security measures, but fail to account for the negligible or malicious actions from these internal contacts who often have high-level access to company systems.  Inside access often isn’t monitored and can easily lead to stolen data or corrupted systems.

Read More »

Data Breach – A Complicated Issue Where No Two Attacks Are The Same

When looking at a company’s risk, one of the most overlooked aspects is how it manages its informational security. In their most recent Data Breach Investigations Report, Verizon was able to classify 92% of the millions of breaches over the past few years into nine basic patterns. It would be a reasonable assumption that these nine patterns of attack would be the same across the business landscape. Unfortunately this is not the case as the sophistication of the attacks change depending on a company’s industry. As an example representing both the Financial and the Energy/Utilities Sectors, the highest type of breach was web app attacks. This occurred as the retail

Read More »

Don’t Lose It Over a Data Breach

Many of the cyber risks discussed today revolve around outside intrusions such as data breaches, viruses, or reputational risks brought on by improper social media use. Another significant risk that must be considered is a major data loss event, whether caused by a technical malfunction or a non-technical property loss such as fire or water damage. While you cannot guarantee a data loss will not happen, there are ways to indemnify and protect yourself if you experience such a data loss.

Read More »

HACKED

With the continued news reports of  data breaches of high profile businesses, most recently Target, Adobe, Lexis Nexis, and Apple, I thought I would provide you a few thoughts to add to your risk management “New Year’s resolutions” (I know you have them…). Since most of you know I travel quite frequently, both domestically and internationally, I use the wait time at airports, hotels, etc. to work.  I thought the article in the last issue of Executive Travel magazine is a good reminder to all of us on electronic “travel security” and how not to be duped by the growing sophistication of the hackers who prey on the weary business

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content