The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

Cyber Risk is Real: Fill in Liability Gaps with Insurance

Data breaches are a very serious threat to companies and individuals; their occurrence and impact is increasing drastically year over year. Hackers are looking to steal your financial data, personal information, and intellectual property.  Often, the financial and reputational impact of a breach can be disastrous for an organization.

Read More »

Understanding Your Organization’s Risk Tolerance Levels

A constant struggle for the risk manager of an organization is balancing the profitability expectations of its shareholders and maximizing operational efficiency of the risk management team in order to reduce the organization’s Total Cost of Risk (TCoR). Having a clear perspective of the organization’s appetite for risk and risk tolerance is a fundamental element needed in order to achieve this balance.

Read More »

Business or Pleasure? Either Could Become a Nightmare without a Mobile Security Policy.

So you are traveling for business or you have finally scheduled a few days away from the office. You pack your bags and are sure to not forget your mobile phone, tablet, and laptop. Now stop for a second and consider the consequences if one of those devices goes missing, is lost, stolen, or even hacked. How much personal or company data would be at risk? Bank account information, e-mails, contact information, confidential business documents. It’s all there for the taking.

Read More »
A modern conference room with A large screen perfect for presentations on risk management services in Florida.

What is Business Personal Property Coverage & What Does it Include?

One of the most underrepresented and disregarded coverage extensions on a commercial property policy is personal property. That is, Business Personal Property (BPP) – the personal property which is owned by the entity that is the named insured on the policy.  BPP covers a variety of items that are typically identified with being owned in relation to the premises identified on the declaration page of your policy. It is not typically intended to insure the personal property of a firm’s employees or guests. Over the course of the last fifteen years there have been several changes to significantly expand the definition of BPP in several different ways. Keep in mind

Read More »

ERM: Process or Strategy? Where is the Value?

The recent Enterprise Risk Management (ERM) Workshop held by North Carolina State University was chock full of valuable information. It was attended by seasoned risk and audit professionals all looking for ways to improve the effectiveness of their own ERM programs.

Read More »

Risk & Compliance Summit: A Recap

Risk, construction and compliance are three concepts that weigh heavily on the minds of owners and contractors globally. This was evident at the recent Risk & Compliance Summit held at Georgia Tech in Atlanta last week.

Read More »

ERM: A Riddle Wrapped Up In an Enigma

While it was never the intent of Winston Churchill that his famous description of Russia’s intentions in 1939 would apply to Enterprise Risk Management (ERM), the analogy applies pretty well. “It is a riddle, wrapped in a mystery, inside an enigma, but perhaps there is a key.” I firmly believe there is a key to a proper, productive and easily understood ERM program.

Read More »

High-Powered Construction Equipment Requires High-Powered Risk Protection

In 2012, the most recent year for which data is available, the United States Bureau of Labor Statistics reported 849 construction worker fatalities. Crane accidents make up a large number of these deaths and an even greater number of construction-related injuries each year.  Not only can a crane accident cause significant injury to workers on a construction site, but it can also cause injury and death to innocent passersby of the site.  Given the risk associated with crane operation on a construction site, what should you – owners and contractors – do to mitigate this risk and limit your exposure?

Read More »

Insider IT Threats

IT-related threats originate from multiple angles, all of which require proper attention and application of mitigation techniques. Perhaps the biggest threat to a company’s IT security is their internal contacts (staff, vendors, contractors, etc.). Many companies are utilizing heightened IT security measures, but fail to account for the negligible or malicious actions from these internal contacts who often have high-level access to company systems.  Inside access often isn’t monitored and can easily lead to stolen data or corrupted systems.

Read More »
Logo of als all heals group featuring a blue palette with a stylized "a" and a starburst design.

Subscribe to our Articles

Newsletter Form