The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Four Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Most companies today opt to distribute their employees’ W-2 tax forms electronically; either through email or some type of download service. Because these forms contain a good deal of Personally Identifiable Information (“PII”), such as name, address, social security number and salary information – cyber thieves are using several simple, yet, tried-and-true methods to fraudulently obtain them.

Read More »
Puzzle pieces forming the word "ERM," standing upright against a background symbolize ERM solutions in Florida.

ERM | Risk Appetite and Risk Tolerance: The Path to Informed Decision Making

In our previous posts in this series, we introduced Enterprise Risk Management (ERM) as a “portfolio view” of risk and discussed various aspects of implementing ERM: roles, culture, a framework and preparing your organization. Now, we’ll begin looking at the “big picture” viewpoint of risk, starting with identifying and prioritizing risks. In the ERM process, management (1) determines acceptable levels of risk, (2) identifies and measures risks throughout the entire organization and aggregates the results, and (3) determines if the aggregated results exceed the acceptable levels. Risk Appetite and Risk Tolerance are the expressions of the “acceptable levels” of risk.

Read More »
A person in a white shirt uses a magnifying glass to read a document on cyber liability insurance at a desk, with a pair of glasses placed nearby.

Reviewing Cyber Breach Insurance Coverage | First-Party Costs

Organizations today must regard cyber breaches not as a possibility, but as an inevitable fact of life. In this environment, it’s crucial to have a cyber liability insurance policy that adequately covers the potential loss and offers payment or reimbursement for response costs. Understanding what’s covered by the policy well before a breach occurs and building that knowledge into your company’s incident response plan is critical.

Read More »
A magnifying glass highlights the words "NOT COVERED" on a document, emphasizing the exclusions listed in your cyber insurance policy.

Gaps and Exclusions | How Will Your Cyber Policy Respond?

When the front lines of IT security fail and a cyber breach occurs, businesses often rely on insurance to reduce the often extreme financial impact associated with the breach. Policies are usually written to ensure that the insured recovers extra expenses incurred and are covered for fines and penalties placed on the company by regulatory agencies.

Read More »
Big Breaches Soar, With No Signs of Slowing Down

Big Breaches Soar, With No Signs of Slowing Down

The year 2016 is turning out to be a record one for data breaches, and cybercrime won’t be slowing down any time soon.  According to global digital security firm Gemalto, nearly five billion private records have been exposed globally since 2013. Data breaches were up 15% in the first half of 2016 compared to the prior six months.

Read More »
Taking a Closer Look At Enterprise Risk Management

Taking a Closer Look At Enterprise Risk Management

Every organization is faced with risks and needs to practice some form of risk management in order to maintain the health of the entity. Many take a traditional approach, where risk is managed in silos, with each leader of a business unit (sales, operations, finance, HR, etc.) responsible for managing the risks that fall within his or her area of responsibility.

Read More »
Cyber Security | Layering your Defense

Cyber Security | Layering your Defense

Does the threat of Ransomware crippling your organization’s network and operations keep you up at night? At this point, it kind of should. However, there’s a lot your CISO and IT staff could be doing to mitigate the threat and help you sleep a bit more soundly.

Read More »
Logo of als all heals group featuring a blue palette with a stylized "a" and a starburst design.

Subscribe to our Articles

Newsletter Form