The ALS Group Risk Management Articles

We manage more than a quarter billion dollars of premiums for a diverse range of clients around the globe. 

A computer monitor displaying a webpage is being examined by a magnifying glass

3 Emerging Risks That All Businesses Face in 2017

Last month, Risk.net, a UK-based website that covers operations risk at financial services firms, released its list of top 10 operational risks for 2017. It’s no surprise that financial services companies face many of the same risks that businesses in all industries face. So what are those top three risks and how can organizations combat them?

Read More »
Fundamentals of a Sound Risk Management Program

The 10 Fundamentals of a Sound Risk Management Program

More than 80% of companies don’t manage risk effectively. Is yours one of them? A 2014 survey by a non-profit business research firm found that fewer than 20 percent of executives say their companies effectively manage risk. Companies will often have a process in place to identify and monitor risks. But they fall short when it comes to actually implementing practices to manage those risks as part of the overall strategic plan.

Read More »
Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Four Ways to Protect Your Employees’ W-2 Information from Cyber Thieves

Most companies today opt to distribute their employees’ W-2 tax forms electronically; either through email or some type of download service. Because these forms contain a good deal of Personally Identifiable Information (“PII”), such as name, address, social security number and salary information – cyber thieves are using several simple, yet, tried-and-true methods to fraudulently obtain them.

Read More »
Puzzle pieces forming the word "ERM," standing upright against a background symbolize ERM solutions in Florida.

ERM | Risk Appetite and Risk Tolerance: The Path to Informed Decision Making

In our previous posts in this series, we introduced Enterprise Risk Management (ERM) as a “portfolio view” of risk and discussed various aspects of implementing ERM: roles, culture, a framework and preparing your organization. Now, we’ll begin looking at the “big picture” viewpoint of risk, starting with identifying and prioritizing risks. In the ERM process, management (1) determines acceptable levels of risk, (2) identifies and measures risks throughout the entire organization and aggregates the results, and (3) determines if the aggregated results exceed the acceptable levels. Risk Appetite and Risk Tolerance are the expressions of the “acceptable levels” of risk.

Read More »
A magnifying glass highlights the words "NOT COVERED" on a document, emphasizing the exclusions listed in your cyber insurance policy.

Gaps and Exclusions | How Will Your Cyber Policy Respond?

When the front lines of IT security fail and a cyber breach occurs, businesses often rely on insurance to reduce the often extreme financial impact associated with the breach. Policies are usually written to ensure that the insured recovers extra expenses incurred and are covered for fines and penalties placed on the company by regulatory agencies.

Read More »
The Internet of Things (IoT)

Is a Cyber Breach on Your Holiday Wish List? | The Internet of Things (IoT)

The holiday season usually means new tech gadgets for everyone to tap, swipe, click, and download.  Most people who unwrap a new iPhone, MacBook, Smartwatch, Fitbit, or game console probably aren’t considering the ramifications of connecting those devices to the Internet and setting up new user accounts filled with their personal information.  Unfortunately, we live in a time where have to, or at the very least, should.

Read More »
Big Breaches Soar, With No Signs of Slowing Down

Big Breaches Soar, With No Signs of Slowing Down

The year 2016 is turning out to be a record one for data breaches, and cybercrime won’t be slowing down any time soon.  According to global digital security firm Gemalto, nearly five billion private records have been exposed globally since 2013. Data breaches were up 15% in the first half of 2016 compared to the prior six months.

Read More »
A map of the United States highlighting California in red, with text "Cyber Breach Notification, California Law Amendment

But, the Data was Encrypted… | California Data Breach Notification Law Amendment

Back in May 2016 I posted a blog (Be Prepared – Data Breach Notification Laws are Changing), which covered how data breach notification laws were evolving.  At that time the state of Tennessee amended its law, becoming the first state in the nation to require notification of any data breach, whether the information is encrypted or not.  I also predicted that state laws would most likely become stricter in the not too distant future…

Read More »
Cyber Security | Layering your Defense

Cyber Security | Layering your Defense

Does the threat of Ransomware crippling your organization’s network and operations keep you up at night? At this point, it kind of should. However, there’s a lot your CISO and IT staff could be doing to mitigate the threat and help you sleep a bit more soundly.

Read More »
Tall glass and steel skyscraper with reflective windows, surrounded by construction cranes

Millennium Tower’s Construction Defects – That Sinking Feeling Continues…

Troubles continue for Millennium Tower, the luxury high-rise building that has been coined “the leaning tower of San Francisco” for tilting two inches at its base and sinking 16 inches.  As we predicted in our August 11th blog, a lawsuit ensued and it’s huge: Condo owners filed a $500 million class-action lawsuit against the developers, Millennium Partners, and the Transbay Joint Powers Authority.

Read More »

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Skip to content