Law Brief®: Rich Schoenstein and Annmarie Giblin Discuss Cyber Law
Cracking the Code: Getting the Most Out of Your Cyber Insurance Policy
Cybersecurity Threats Facing Food and Agribusiness Companies & the Preparation and Protection Safeguards to Help Mitigate Them
Cyber Insurance - An Essential Component to Your Business
London’s Nation-State Attack Exclusion: Game Changer For The Cyber Insurance Market or An Opportunity For Competition Within the Market?
The Significance of Operational Technology in Cyber Insurance Underwriting – Part 2
The Downstream Impact of Ransomware on Cyber Insurance Underwriting – Part 1
Coverage Considerations for Ransomware & Cyber Attacks
Cyber Insurance Changes in the Aftermath of Log4j
Cyberside Chats: There is a war in Europe. What does that mean for your cyber insurance policy?
How Patching log4J Can Mitigate Regulatory and Insurance Issues
Wait, that’s covered? Insurability of Fines and Penalties Flowing From a Cybersecurity Breach
Takeaways From Recent Claims Against Mark Zuckerberg and Facebook – Mitigating the Heightened Risk of Privacy Suits Against Individual Directors and Officers
No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day
Ransomware and Cyber Insurance: The good, the bad, and why your insurance data is a target for hackers (with Jacob Ingerslev)
Debra Geroux and Scott Wrobel on Responding to Data Breaches
Cyber Insurance Coverage Market: A House of Cards or Temporary Plateau?
NGE On Demand: Insurance and Indemnity Issues for Family Offices with Angela Elbert
Nota Bene Episode 114: The New Global Business of Cyberattack, from Ransomware to a Now-Ubiquitous State of Breach with Kari Rollins
The Ransomware Attack Part 2 – How To Respond When The Enemy Overcomes The Gates
At the recent In-House Counsel Seminar, three Ward and Smith attorneys presented a realistic role play response to an incidence of wire fraud, addressing red flags associated with fraudulent communications, corporate incident...more
Email scams and viruses are nothing new—threats like phishing emails and malware have been around since the days when services like AOL still dominated the internet and email landscape. However, while technology has made a...more
Continued widespread cyber attacks have leaders in just about every industry wary and watchful, and insurance underwriters are no exception. Given the increase in claims from recent ransomware attacks, cyber insurers are...more
In meetings with data security professionals, the same topic tends to arise: Why are we fighting the same security battles now that we fought 20 years ago? The history of network and cyber security seems to be a...more
Each year, the Internet Crime Complaint Center (“IC3”) of the Federal Bureau of Investigation publishes its Internet Crime Report. The IC3’s 2020 Internet Crime Report includes startling information about the continuing...more
When a data breach occurs, one step is often overlooked in the rush to remediate: preserving as much of the data logs and backups as possible That’s a mistake, say Debra Geroux, Shareholder at Butzel Long and Scott Wrobel,...more
Alorica Inc., a technology services company, was the victim of an apparent phishing attack in October 2017. After gaining access to Alorica's email system, hackers created rules to prevent Alorica from seeing their...more
Although it is logical that cyber attacks have risen during the pandemic, and there is anecdotal evidence that it is occurring, including our own experience, an interesting new report was recently released by Allianz, which...more
U.S. hospitals, already on the front lines of fighting the coronavirus pandemic, are now facing viral attacks by cybercriminals. More than 20 U.S. hospitals and health care organizations have reported their data being held...more
Media outlets recently reported that Barbara Corcoran, one of the judges on the popular ABC show "Shark Tank," was the victim of a "spear phishing" scam....more
With unprecedented activity online, cybercrime is growing in frequency, sophistication and aggregate effect. Despite the increased visibility of cybercrime, cybersecurity continues to lag behind this curve. Cybercriminals...more
Companies of all sizes have fallen victim to attacks whereby fraudsters will use deceptive communications, such as spoofed emails, to trick an employee into transferring money into the fraudsters’ control. While these...more
It is an all-too-common dilemma. As phishing schemes have become more prevalent and more sophisticated, businesses of all sizes have fallen victim to these attacks where a fraudster will use a spoofed email or other deceptive...more
According to a recent survey of cybersecurity professionals by AT&T Cybersecurity entitled “Confidence: the perception and reality of cybersecurity threats,” phishing and cloud security threats are keeping them up at night....more
Cyber incidents can take many forms—phishing, insider theft, SQL injection, malware, denial of service, session hijacking, credential farming, or just old fashion “hacking.” Although many of these attack vectors employ...more
A new Sixth Circuit decision may signal an emerging trend on whether insurers must cover claims made by policyholders who fall victim to phishing scams....more
On insurance coverage issues, sometimes the boat seems to be listing in the wrong direction. For example, insurers have long tilted the decks to avoid coverage for “spoofing” attacks and similar kinds of email fraud by...more
2017 has reminded us that data security threats continue to evolve and that the stakes for companies can be very high if their data security programs fail to evolve as well. Before the recent announcement of Equifax’s...more
On June 27, 2017, the world had its second major ransomware attack in two months, and experts are predicting more to come. The first, named WannaCry, began May 12, and quickly spread to over 400,000 machines, the vast...more
This is not a drill. Companies and law enforcement agencies around the world have been left scrambling after the world’s most prolific ransomware attack hit over 500,000 computers in 150 countries over a span of only 4...more
The coverage landscape for “Business E-mail Compromise” (BEC) scams remains somewhat tenuous, as organizations and carriers continue to battle in court over the extent of coverage. Although recent positive,...more
Second only to health care, the manufacturing industry is now one of the most frequently hacked industries (according to IBM’s 2016 Cyber Security Intelligence Index). And more importantly, automotive manufacturing was the...more
In late June, the New York Court of Appeals affirmed a trial court ruling that there was no coverage for a health insurance company policyholder, under a “Computer Systems Fraud” rider issued by its insurer, for an underlying...more