Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more
10/3/2018
/ Computer Fraud Insurance ,
Cyber Attacks ,
Cyber Insurance ,
Cybersecurity ,
Data Protection ,
Hackers ,
Insurance Industry ,
Phishing Scams ,
Policy Exclusions ,
Popular ,
Spoofing
This webinar focuses on strategies for mitigating reputational, litigation, and regulatory risk in the post-data breach environment. We will offer specific practice tips to implement during this crisis period that are...more
Cyber liability is a clear and present danger. Target Corp. recently reported at least $235 million as gross expenses related to its 2013 data breach. Fortunately, Target was able to recover $90 million of that loss under...more