Commercial Lines

Grasping for Green

Willie Sutton, the infamous 20th century criminal, was once asked why he robbed banks. He replied simply, “Because that’s where the money is.” In hindsight, it seems like such a simple idea and could explain, in part,...

The Artful Balance of the Mandatory Confession: Data Breach Notification

Alerting your customers and the world that you’ve recently been a victim of a data breach or loss event is fraught with public relations and legal challenges. From the moment the data loss event is discovered, the clo...

Maintaining a Website in the Age of Cyber Attacks

It happens all the time. A popular website suddenly goes down, leaving frustrated users with a message that states the obvious: “Our service is temporarily down for maintenance.” Sometimes, the maintenance is routine....

Fighting the Growing Threat of Cyber Extortion

Cyber criminals today aren’t just hacking into vulnerable computer systems. They’re hijacking them for hefty ransoms. The crime of cyber extortion has become easier and grown exponentially in Europe in the past two...

Cyber Threats Echo Wars of Years Past: Reflections on President’s Day

In 1776, future President of the United States General George Washington led an inexperienced, ragtag army of colonists against a well-trained foreign army. Following a retreat from New York City in late summer that...

You Downloaded a Virus and Lost All Your Data. Now What?

Slamming the keyboard and smacking the monitor might relieve your frustration, but it won’t cure the virus that’s infected your computer. It also won’t restore the documents and spreadsheets that you worked on for...

Little Glitch, Big Problems

The software behind websites can contain millions of lines of code. And you don’t need to look far to see how a small error can lead to a large release of personally identifiable information (PII), protected health...

Growth of Online Media and Publishing Brings New Risks

Finding a photo online is simple. Paying tens of thousands of dollars for copyright infringement can be a challenge. According to federal law , you can sue a company for using your photo and receive an award of up to...

The Far-Reaching Effects of a Data Breach

The rapid growth of technology has created new threats for businesses around the world and made it easier than ever to lose money and damage a firm’s brand or reputation. Each week, our new Cyber Monday series will...

It’s More Than Just “Cyber”: Stealing Data the Old-Fashioned Way

The rapid growth of technology has created new threats for businesses around the world, and made it easier than ever to lose money and damage a firm's brand or reputation. Each week, our new Cyber Monday series will...