Resources

Filter >Clear all<

Cyber 15 Jan, 2019

What is... cryptojacking?

The past few years have witnessed a massive growth in the use of cryptocurrencies, and their increasing popularity has seen their values soar in re...

Article

Cyber 10 Jan, 2019

FTC publishes guidelines for businesses considering cyber insurance

The Federal Trade Commission (FTC), an American body focusing on consumer protection, recently espoused the benefits of cyber insurance and publish...

Article

Cyber 7 Jan, 2019

Cyber claims: Legacy system letdown

A ransomware attack on an electrical firm sparks the collapse of a vital accounting system

Case study

Cyber 7 Jan, 2019

Cyber Claims Case Study: Legacy system letdown

Most modern companies, even those who might not believe they have a significant cyber exposure, utilize their computer systems to perform certain b...

Article

Cyber 18 Dec, 2018

UK businesses prime target for funds transfer fraud

UK cyber policyholders are more than twice as likely as their US counterparts to claim for social engineering-driven attacks

Article

Cyber 4 Dec, 2018

Cyber claims case study: Phishing for funds

A business email compromise scam tricks law firm into transferring money to fraudsters

Case study

Cyber 3 Dec, 2018

What is...targeted extortion?

We're kicking off our brand new "What is...?" series today with targeted extortion. This growing threat is an evolution of the more well-known rans...

Article

Cyber 30 Nov, 2018

2018 Cyber Symposium: Cyber attacks inevitable

200 of the London market’s preeminent cyber insurance professionals gathered at our recent 2018 Cyber Symposium to listen as Jamie Bartlett, author...

Article

Cyber 20 Nov, 2018

Gotcha! Three cyber policy traps to look out for

Cyber insurance is projected to experience major growth in the years ahead and new insurers are regularly entering the market. While this is creati...

Article

Cyber 16 Nov, 2018

Business interrupted: Part three (1)

Following on from our previous articles on indemnity periods and time retentions, we are concluding our business interruption series by looking at...

Article

Cyber 16 Nov, 2018

Business interrupted: Part three

Following on from our previous posts on indemnity periods and time retentions, we're concluding our business interruption series by looking at the...

Article

Cyber 12 Nov, 2018

Registration: Top cyber insurance myths debunked

Due to popular demand, we are re-running our webinar on debunking the top six cyber myths.

Webinar
Cyber claims case study - Malware mayhem

Cyber 6 Nov, 2018

Cyber claims case study: Malware mayhem

A technology software provider that fell victim to a targeted cyber extortion attack, in which their data and applications were encrypted and held...

Case study

Cyber 6 Nov, 2018

Business interrupted: Part two

Following on from the first installment of our cyber BI series which focused on the issue of indemnity periods, this time we will take a look at th...

Article

Cyber 19 Oct, 2018

Beware the data breach bear trap

Over the course of 2018, we have seen numerous pieces of data breach legislation come into force. However, while all this legislation is undoubtedl...

Article

Cyber 9 Oct, 2018

Cyber claims case study: Software shutdown

Cyber attack results in contractual complications for property management firm

Case study

Cyber 9 Oct, 2018

Business interrupted: Part one

Today, business interruption in cyber insurance policies is back in a big way. This blog series explores the many ways in which BI cover is essenti...

Article

Cyber 21 Sept, 2018

Funds Transfer Fraud - Old tricks, new tactics

Social engineering involves the use of deception to manipulate individuals into carrying out a particular act, such as transferring money, handing...

Article