Remove Blog Remove Encryption Remove Insurance Remove Training
article thumbnail

How to make sure your cyber insurance policy pays out

IT Governance

Cyber insurance is big business these days. Damages incurred by information security incidents generally aren’t covered in commercial insurance policies, so a specific policy is necessary to help cover the costs of things like forensic investigation, incident response and notification procedures. Perform staff awareness training.

article thumbnail

New York Regulators Call on Insurers to Strengthen the Cyber Underwriting Process

Hunton Privacy

As reported on the Hunton Insurance Recovery blog , on February 4, 2021, the New York Department of Financial Services (“NYDFS”), which regulates the business of insurance in New York, has issued guidelines, in the Insurance Circular Letter No. sought coverage for expenses under its property insurance policy.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Here is Erin’s Q&A column, which originally went live on OneRep’s well-done blog.) For the first expert interview on our blog, we welcomed Pulitzer-winning investigative reporter Byron V. Regular training and simulations can help reduce risks associated with human errors.

article thumbnail

How to manage the growing costs of cyber security

IT Governance

The costs of anti-virus software, staff awareness training, Cloud services and countless other resources stack up – and even then, you need to find skilled personnel to lead your security strategy, which is easier said than done. You’ll have access to a wide range of tools, training and support that can be deployed to kick-start your journey.

Security 124
article thumbnail

Top 5 Cyber Security Risks for Businesses

IT Governance

In this blog, we look at the top five cyber security risks that businesses face, and explain how you can prevent them. It’s a type of malware that encrypts files, preventing the victim from accessing their systems. The risks we’ve listed in this blog are only the starting point for cyber criminals. Poor patch management.

Risk 144
article thumbnail

Data privacy examples

IBM Big Data Hub

The app heavily encrypts all user financial data. Deploying privacy protections: The app uses encryption to protect data from cybercriminals and other prying eyes. Example A healthcare provider encrypts patient data storage and uses an intrusion detection system to monitor all traffic to the database.

article thumbnail

OCR 2020 Settlements Target HIPAA Security Rule Non-Compliance

Data Matters

Department of Health and Human Services, Office for Civil Rights (“OCR”) has settled three cases related to alleged violations of the Health Insurance Portability and Accountability Act (“HIPAA”), totaling $1,165,000. In particular, OCR has focused on the following elements the Security Rule: Encryption practices designed to protect ePHI.