Not yet trading admitted with CFC? Find out more about our market-leading admitted products
Sign up for the latest cyber news, tools and resources, straight to your inbox every month!
Explore the latest on Cyber, Emerging risks and Specialist insurance.
New mobile app adds proprietary data enrichment and threat intelligence feeds for customer attack prevention
After a CEO's email account is hacked, a care home faces huge financial loss from social engineering
While the massive influx of remote working has woken many businesses up to their cyber risk, it is also creating more opportunities for cybercrimin...
Lindsey Nelson, Cyber Development Leader deep dives into five key reasons hackers target SMEs
Our Incident Response Team wishes to advise all insureds of a critical vulnerability in the Windows DNS server that allows cybercriminals to gain w...
A city government falls victim to a fraudster on the watch for sizeable wire transfers
Although we missed the excitement and glamour of meeting our industry colleagues in New York, the CFC cyber team still had a great time celebrating...
3 months of FREE support during COVID-19
Two-factor authentication (2FA), also known as multi-factor authentication (MFA), is an extra layer of security used to verify the identity of the...
As businesses around the world adapt to the new normal of home-working, malicious actors are similarly adapting to target remote workers by utilizi...
Hackers access a school's systems through remote desktop protocol and hold data to ransom
[Updated] Public concern and working-from-home mandates are providing opportunities for cybercriminals.
A haulage firm loses several large tax payments after their accountant's email is spoofed
New ransomware variant is known to exfiltrate data prior to encryption, allowing hackers to publish data if the ransom isn't paid.
Targeted ransomware attacks against IT managed service providers (MSPs) are on the rise with potentially catastrophic implications for both the MSP...
A charity's payment to a research partner is sent to a fraudulent account after an email account is compromised
Recently discovered vulnerability undermines how Windows verifies trustworthy sources
Did you miss our Cyber 102 Workshop? We've assembled all of the talks here so you can catch up from the comfort of your desk.