MrInsurability May 25, 2017 No Comments

Securing Your Computer

securing your computerOne of the ways to keep your data breach insurance costs down is by securing your computer to avoid claims. You may ask how this is done and the answer is really quite easy. The top proven technique to block hackers from attacking is to make better passwords.

Your password is the doorway to your computer and your valuables inside. Doors can be cheap and weak or extremely strong. It’s all up to you to make it the way you want it. Read more

MrInsurability April 20, 2017 No Comments

Ransomware – It’s Everyone’s Problem Now

ransomwareA new and devastating virus is affecting computer owners and users of all sizes, shapes and descriptions. It is called Ransomware.

This is a type of malware that infects computer systems, restricting the users’ access to the infected systems. It typically attempts to extort money it’s from victims by displaying an on-screen alert.

This alert will usually say that the user’s system has been locked or that the user’s files have been encrypted. Users are told that unless a ransom (fee) is paid, access will not be restored. Read more

MrInsurability April 14, 2017 No Comments

Security Risks Keep Changing

Security Risks Keep ChangingSecurity Risks Keep Changing. Information Security Risks, Data Breaches and Identity Fraud are not disappearing trends. As a matter of fact these types of attacks are becoming more frequent and more complex in nature.

New legislation and ever-changing contractual requirements, has added to the complexity of managing cyber-threats for the business owner. Read more

MrInsurability April 7, 2017 No Comments

Data Breach Recovery Costs

data breach recovery costsToday, let’s take a look at data breach recovery costs and some typical types of coverage.

The first thing to consider is that the majority of states have data breach notice laws. These require that notification be made to individuals, if their nonpublic personally identifiable information has been exposed.

These laws also apply in cases of personal health information being compromised.

Data breach recovery costs can be expensive. Depending upon the number of impacted individuals and compromised records, this could be the most expensive portion of your recovery! Read more

MrInsurability April 7, 2017 No Comments

Nonpublic Personally Identifiable Information

Nonpublic Personally Identifiable InformationToday let’s continue with our look at the need for data breach insurance and Nonpublic Personally Identifiable Information. We previously mentioned that stolen records most often include this type of information. You may be wondering what this information would consist of, so, let’s look at some possibilities.

Just about all businesses, no matter the size, collect data about their employees, customers and tenants. Just what is nonpublic personally identifiable information? Below is a list of the most common items. If your company collects any of these, then you need to have safeguards in place. Read more

MrInsurability March 27, 2017 No Comments

Data Breach Categories

Data Breach CategoriesIf you’ll remember, before our list of terminology, we looked at a variety of the causes of data breaches. Now, let’s narrow it down a bit further. All of the causes that we looked at seem to fall into 3 basic categories. These data breach categories include: human error, employee error and criminal activity.

The following percentages let us know what we might be facing:

  • Human Error – 19%
  • System Error – 32%
  • Criminal Activity – 40%

As the percentages show, there are still a few unknowns. Surprisingly, we can see that criminal attack is actually less than one-half of the overall cause of the problem.

In order to get an even closer look, let’s look at some of the misconceptions about data breaches. Read more

MrInsurability March 23, 2017 No Comments

Data Breach Terminology

Data Breach TerminologyOur last 2 posts were naming the various ways that a data breach can occur. Now, that certainly was not a complete list, but it covered the most common. Then it occurred to me that some of the data breach terminology used, when talking about this subject, may be new to many.

So, I thought we’d go with another list. This one covers some of the more common terms used and their meaning. I hope it helps make things a little clearer.

Again, this is far from being a complete list of data breach terminology, but it is enough to get the ball rolling. This list is an excerpt from an article by Sid Kirchheimer in AARP magazine. He is the author of Scam-Proof Your Life, published by AARP Books/Sterling. Read more