Incident Response Planning Services

image placeholder for Marchel & Associates

Do you know what your business would do if it were hit with a data security breach? Studies show businesses with an incident response plan in place when a breach occurs suffer less economic and reputational harm while also returning to business more quickly than those that have not prepared in advance. Our Incident Response…

Read More

Applying the Resources of a Cyber Policy to a Cyber Incident

image placeholder for Marchel & Associates

Ransomware attacks have increased and monetary demands have tripled over last year. This program will begin with an overview of claims trends in the cyber arena. An interactive case study of a ransomware attack has been prepared. A group of experts consisting of: Insurance Claims Counsel, Cyber Breach Coach, Forensics and Security experts will walk…

Read More

Insurance Industry Buzzes Over Data Breach Ruling

data breach

If the rash of data breaches in recent months has done anything for businesses, it’s raised their awareness of cyber liability insurance. The market for cyber liability insurance is expected to increase dramatically as businesses become more aware that their current policies don’t adequately cover cyber-risks, according to the National Association of Insurance Commissioners. However,…

Read More

Cyber Insurance: Preparation for a Breach

breached

Managing risk in a digital infrastructure is an increasingly complex and challenging problem, one that can’t be completely mitigated through technology, and the cost of data breaches are increasing.  The average organizational cost of a data breach in the U.S. is $5.85 million.  The average cost of data breach notification alone in the U.S. is…

Read More

Data Breach Causes

data-breach-causes

Where are the threats? Inside threats –Employee negligence Security failures Lost mobile devices –Employee ignorance Improper disposal of personal information (dumpsters) Lack of education and awareness –Malicious employees Outside threats –Hackers Malware Phishing and Spear Phishing –Thieves (including Social Engineering Tools) –Vendors

Read More

The Cyber Underground

cyber-underground

Money Transfer – Exchange Laundering Escrow Payment Processors Cyber criminals attempt to maintain their anonymity through electronic payment systems and virtual currencies.  They primarily use approved exchangers or money laundering services to receive/retrieve money within these accounts.   Communication Secure, reliable communication is vital for criminals to do business.  Jabber is the prominent method, especially on…

Read More

Is Your Company Ready For A Data Breach?

data-breach-costs

Data Breach Costs per Sector The cost of a data breach can vary significantly by industry, due to differences in the types of data collected and various regulatory and compliance obligations. A recent study showed that healthcare currently expects the largest cost, at an average of $359 per record. Note these numbers contemplate both the…

Read More