CINXE.COM
Cybersecurity | Emergency Resource Center | Risk Strategies
<!doctype html><html lang="en"><head> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta charset="utf-8"> <title>Cybersecurity | Emergency Resource Center | Risk Strategies</title> <link rel="shortcut icon" href="https://www.risk-strategies.com/hubfs/assets/images/logos/utility/favicon.svg"> <meta name="description" content="Click here to read featured news and comprehensive insights."> <link rel="stylesheet" href="https://use.typekit.net/vrp0xka.css"> <link rel="preload" href="https://www.risk-strategies.com/hs-fs/hub/20256628/hub_generated/template_assets/81097728601/1731357217812/mjtw/css/mjtw_styles.min.css" as="style"> <link rel="preload" href="//cdn2.hubspot.net/hub/20256628/hub_generated/template_assets/81097728599/1727870421215/mjtw/js/mjtw_main.min.js" as="script"> <link rel="stylesheet" href="https://use.typekit.net/vrp0xka.css"> <style> @font-face { font-family: 'Material Symbols Rounded'; font-style: normal; font-weight: 100; src: url("https://www.risk-strategies.com/hubfs/raw_assets/public/mjtw/fonts/material-symbols-rounded-48-500-1-0.woff2") format('woff2'); font-display: block; } .material-symbols-rounded { font-family: 'Material Symbols Rounded'; font-weight: normal; font-style: normal; font-size: 24px; line-height: 1; letter-spacing: normal; text-transform: none; display: inline-block; white-space: nowrap; word-wrap: normal; direction: ltr; -moz-font-feature-settings: 'liga'; -moz-osx-font-smoothing: grayscale; width: 24px; height: 24px; } /* .material-symbols-rounded { font-variation-settings: 'FILL' 1, 'wght' 400, 'GRAD' 200, 'opsz' 48 } */ </style> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta property="og:description" content="Click here to read featured news and comprehensive insights."> <meta property="og:title" content="Cybersecurity | Emergency Resource Center | Risk Strategies"> <meta name="twitter:description" content="Click here to read featured news and comprehensive insights."> <meta name="twitter:title" content="Cybersecurity | Emergency Resource Center | Risk Strategies"> <style> a.cta_button{-moz-box-sizing:content-box !important;-webkit-box-sizing:content-box !important;box-sizing:content-box !important;vertical-align:middle}.hs-breadcrumb-menu{list-style-type:none;margin:0px 0px 0px 0px;padding:0px 0px 0px 0px}.hs-breadcrumb-menu-item{float:left;padding:10px 0px 10px 10px}.hs-breadcrumb-menu-divider:before{content:'›';padding-left:10px}.hs-featured-image-link{border:0}.hs-featured-image{float:right;margin:0 0 20px 20px;max-width:50%}@media (max-width: 568px){.hs-featured-image{float:none;margin:0;width:100%;max-width:100%}}.hs-screen-reader-text{clip:rect(1px, 1px, 1px, 1px);height:1px;overflow:hidden;position:absolute !important;width:1px} </style> <link rel="stylesheet" href="https://www.risk-strategies.com/hs-fs/hub/20256628/hub_generated/template_assets/81097728601/1731357217812/mjtw/css/mjtw_styles.min.css"> <!-- Added by GoogleAnalytics integration --> <script> var _hsp = window._hsp = window._hsp || []; _hsp.push(['addPrivacyConsentListener', function(consent) { if (consent.allowed || (consent.categories && consent.categories.analytics)) { (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create','UA-45290059-1','auto'); ga('send','pageview'); }}]); </script> <!-- /Added by GoogleAnalytics integration --> <!-- Added by GoogleAnalytics4 integration --> <script> var _hsp = window._hsp = window._hsp || []; window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} var useGoogleConsentModeV2 = true; var waitForUpdateMillis = 1000; if (!window._hsGoogleConsentRunOnce) { window._hsGoogleConsentRunOnce = true; gtag('consent', 'default', { 'ad_storage': 'denied', 'analytics_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'wait_for_update': waitForUpdateMillis }); if (useGoogleConsentModeV2) { _hsp.push(['useGoogleConsentModeV2']) } else { _hsp.push(['addPrivacyConsentListener', function(consent){ var hasAnalyticsConsent = consent && (consent.allowed || (consent.categories && consent.categories.analytics)); var hasAdsConsent = consent && (consent.allowed || (consent.categories && consent.categories.advertisement)); gtag('consent', 'update', { 'ad_storage': hasAdsConsent ? 'granted' : 'denied', 'analytics_storage': hasAnalyticsConsent ? 'granted' : 'denied', 'ad_user_data': hasAdsConsent ? 'granted' : 'denied', 'ad_personalization': hasAdsConsent ? 'granted' : 'denied' }); }]); } } gtag('js', new Date()); gtag('set', 'developer_id.dZTQ1Zm', true); gtag('config', 'G-8QSF0JTQSP'); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-8QSF0JTQSP"></script> <!-- /Added by GoogleAnalytics4 integration --> <!-- Added by GoogleTagManager integration --> <script> var _hsp = window._hsp = window._hsp || []; window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} var useGoogleConsentModeV2 = true; var waitForUpdateMillis = 1000; var hsLoadGtm = function loadGtm() { if(window._hsGtmLoadOnce) { return; } if (useGoogleConsentModeV2) { gtag('set','developer_id.dZTQ1Zm',true); gtag('consent', 'default', { 'ad_storage': 'denied', 'analytics_storage': 'denied', 'ad_user_data': 'denied', 'ad_personalization': 'denied', 'wait_for_update': waitForUpdateMillis }); _hsp.push(['useGoogleConsentModeV2']) } (function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer','GTM-PZZSQ7S'); window._hsGtmLoadOnce = true; }; _hsp.push(['addPrivacyConsentListener', function(consent){ if(consent.allowed || (consent.categories && consent.categories.analytics)){ hsLoadGtm(); } }]); </script> <!-- /Added by GoogleTagManager integration --> <link rel="canonical" href="https://www.risk-strategies.com/insights/emergency-resource-center/cybersecurity"> <script type="text/javascript" src="https://www.risk-strategies.com/hubfs/assets/js/jquery-3.7.1.min.js"></script> <script type="text/javascript" src="https://www.risk-strategies.com/hubfs/assets/js/jquery-migrate-3.4.1.min.js"></script> <script defer type="text/javascript" src="https://api.huckabuy.com/s/d3d3LnJpc2stc3RyYXRlZ2llcy5jb20=/install.js"></script> <meta property="og:image" content="https://www.risk-strategies.com/hubfs/assets/images/logos/utility/featured-image@2x.jpg"> <meta property="og:image:width" content="1600"> <meta property="og:image:height" content="900"> <meta property="og:image:alt" content="We see risk through your lens. | Risk Strategies"> <meta name="twitter:image" content="https://www.risk-strategies.com/hubfs/assets/images/logos/utility/featured-image@2x.jpg"> <meta name="twitter:image:alt" content="We see risk through your lens. | Risk Strategies"> <meta property="og:url" content="https://www.risk-strategies.com/insights/emergency-resource-center/cybersecurity"> <meta name="twitter:card" content="summary_large_image"> <meta http-equiv="content-language" content="en"> <meta name="generator" content="HubSpot"></head> <body> <!-- Added by GoogleTagManager integration --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-PZZSQ7S" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- /Added by GoogleTagManager integration --> <div class=""> <div class="body-wrapper hs-content-id-86069678848 hs-site-page page "> <div id="hs_cos_wrapper_page_settings" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"></div> <div id="hs_cos_wrapper_module_site_header" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <header class="site-header site-header--on-light" role="banner"> <div class="site-header__top"> <div class="site-header__top-inner"> <div class="site-header__top-left"> <div class="site-header__skip-navigation"> <a class="site-header__skip-navigation-link cta-btn cta-btn--small" href="#main-content">Skip Navigation</a> </div> </div> <div class="site-header__secondary-menu"> <div id="hs_menu_wrapper_module_site_header_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="default" data-menu-id="81107954865" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/careers/" role="menuitem">Careers</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/report-claim" role="menuitem">Report a Claim</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/clients" role="menuitem">Clients</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/contact-us/" role="menuitem">Contact Us</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/employee-portal" role="menuitem">Employees</a></li> </ul> </div> </div> </div> </div> <div class="site-header__bottom"> <div class="site-header__bottom-inner"> <div class="site-header__bottom-left"> <div class="site-header__logo"> <a href="/?hsLang=en"> <img src="https://www.risk-strategies.com/hubfs/assets/images/logos/logo-full-color.svg" alt="Risk Strategies Logo" width="106" height="50"> </a> </div> </div> <div class="site-header__bottom-middle"> <div class="site-header__main-menu"> <div class="hs-menu-wrapper"> <ul> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <button class="mega-menu__trigger" data-trigger="menu-industries" aria-expanded="false" id="industries-menu"> Industries </button> <div class="mega-menu" data-menu="menu-industries" hidden aria-labelledby="#industries-menu"> <div class="mega-menu__inner"> <div class="mega-menu__grid"> <div class="mega-menu__grid-column"> <h2 class="h3"> Industries </h2> </div> <div class="mega-menu__grid-column"> <div class="mega-menu__parent-menu mega-menu__parent-menu--parent-only"> <ul class="mega-menu__parent-menu-list"> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/agriculture/"> <span> Agriculture </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/architects-engineers"> <span> Architects & Engineers </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/aviation"> <span> Aviation </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/cannabis"> <span> Cannabis </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/construction"> <span> Construction </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/dental"> <span> Dental </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/education/"> <span> Education </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/entertainment/"> <span> Entertainment </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/financial-services/"> <span> Financial Services </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/fine-art/"> <span> Fine Art </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/healthcare/"> <span> Healthcare </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/law-firms"> <span> Law Firms </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/marine-yacht/"> <span> Marine & Yacht </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/nonprofit/"> <span> Nonprofit & Human Services </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/private-equity"> <span> Private Equity </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/public-sector"> <span> Public Sector </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/real-estate"> <span> Real Estate </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/relocation"> <span> Relocation </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/transportation/"> <span> Transportation </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/waste-and-recycling"> <span> Waste & Recycling </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/wineries-vineyards"> <span> Wineries </span> </a> </li> </ul> </div> </div> </div> </div> <button class="mega-menu__close-btn" aria-label="Close"> <svg width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M18.3 5.70997C17.91 5.31997 17.28 5.31997 16.89 5.70997L12 10.59L7.10997 5.69997C6.71997 5.30997 6.08997 5.30997 5.69997 5.69997C5.30997 6.08997 5.30997 6.71997 5.69997 7.10997L10.59 12L5.69997 16.89C5.30997 17.28 5.30997 17.91 5.69997 18.3C6.08997 18.69 6.71997 18.69 7.10997 18.3L12 13.41L16.89 18.3C17.28 18.69 17.91 18.69 18.3 18.3C18.69 17.91 18.69 17.28 18.3 16.89L13.41 12L18.3 7.10997C18.68 6.72997 18.68 6.08997 18.3 5.70997Z" fill="#2C5697" /> </svg> </button> </div> </li> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <button class="mega-menu__trigger" data-trigger="menu-solutions" aria-expanded="false" id="solutions-menu"> Solutions </button> <div class="mega-menu" data-menu="menu-solutions" hidden aria-labelledby="#solutions-menu"> <div class="mega-menu__inner"> <div class="mega-menu__grid"> <div class="mega-menu__grid-column"> <h2 class="h3"> Solutions </h2> </div> <div class="mega-menu__grid-column"> <div class="mega-menu__parent-menu mega-menu__parent-menu--parents-children"> <ul> <li class="mega-menu__parent-menu-item"> <button class="mega-menu__child-menu-trigger mega-menu__parent-menu-link mega-menu__parent-menu-link--button" aria-expanded="true"> <span> Business Insurance </span> </button> <div class="mega-menu__child-menu" data-level="1"> <ul> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/captives"> <span> Captives </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/casualty"> <span> Casualty </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/cyber-risk"> <span> Cyber </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/environmental"> <span> Environmental </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/international"> <span> International </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/management-liability"> <span> Management Liability </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/property"> <span> Property </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/business-insurance/surety"> <span> Surety </span> </a> </li> </ul> </div> </li> <li class="mega-menu__parent-menu-item"> <button class="mega-menu__child-menu-trigger mega-menu__parent-menu-link mega-menu__parent-menu-link--button" aria-expanded="false"> <span> Employee Benefits </span> </button> <div class="mega-menu__child-menu" data-level="2" hidden> <ul> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/"> <span> Employee Benefits Overview </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/benefit-administration-technology"> <span> Benefit Administration and Technology </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/benefits-compliance-support"> <span> Benefits Compliance Support </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/data-and-analytics"> <span> Data & Analytics </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/human-capital-advisory-services"> <span> Human Capital Advisory Services </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/international-benefits"> <span> International Benefits </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/absence-management-and-ancillary-program"> <span> Absence Management & Ancillary Programs </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/employee-benefits/voluntary-and-lifestyle-benefits"> <span> Voluntary & Lifestyle Benefits </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/medicare"> <span> Medicare </span> </a> </li> </ul> </div> </li> <li class="mega-menu__parent-menu-item"> <button class="mega-menu__child-menu-trigger mega-menu__parent-menu-link mega-menu__parent-menu-link--button" aria-expanded="false"> <span> Financial & Wealth </span> </button> <div class="mega-menu__child-menu" data-level="3" hidden> <ul> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/financial-wealth/"> <span> Financial & Wealth Overview </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/financial-wealth/life-insurance"> <span> Life Insurance </span> </a> </li> </ul> </div> </li> <li class="mega-menu__parent-menu-item"> <button class="mega-menu__child-menu-trigger mega-menu__parent-menu-link mega-menu__parent-menu-link--button" aria-expanded="false"> <span> Private Client Services </span> </button> <div class="mega-menu__child-menu" data-level="4" hidden> <ul> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services"> <span> Private Client Services Overview </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/home-estate/"> <span> Homeowners </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/flood-insurance"> <span> Flood </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/collections/"> <span> Collections </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/umbrella-excess-liability"> <span> Umbrella & Excess Liability </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/auto"> <span> Auto </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/collector-car-insurance"> <span> Collector & Exotic Car </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/marine-yacht/individuals"> <span> Boat & Yacht </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/family-office"> <span> Family Office </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/private-client-services/specialty-coverages/"> <span> Specialty Coverages </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/privateclientresources"> <span> Private Client Risk Resource Center </span> </a> </li> </ul> </div> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/industries/healthcare/reinsurance"> <span> Reinsurance </span> </a> </li> <li class="mega-menu__parent-menu-item"> <button class="mega-menu__child-menu-trigger mega-menu__parent-menu-link mega-menu__parent-menu-link--button" aria-expanded="false"> <span> Risk Management Services </span> </button> <div class="mega-menu__child-menu" data-level="6" hidden> <ul> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/risk-management-services/"> <span> Risk Management Services Overview </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/risk-management-services/analytics/"> <span> Analytics </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/risk-management-services/claims/"> <span> Claims Management & Advocacy </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/risk-management-services/loss-control/"> <span> Loss Control </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/industries/risk-management/safety-services"> <span> Safety Consulting Services </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/pro-safety-training-course-catalog"> <span> Pro Safety Training Courses </span> </a> </li> <li class="mega-menu__child-menu-item" data-level="2"> <a href="https://www.risk-strategies.com/workers-comp-insurance-premium-review-recovery"> <span> Workers’ Comp: Premium Review & Recovery </span> </a> </li> </ul> </div> </li> </ul> </div> </div> </div> </div> <button class="mega-menu__close-btn" aria-label="Close"> <svg width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M18.3 5.70997C17.91 5.31997 17.28 5.31997 16.89 5.70997L12 10.59L7.10997 5.69997C6.71997 5.30997 6.08997 5.30997 5.69997 5.69997C5.30997 6.08997 5.30997 6.71997 5.69997 7.10997L10.59 12L5.69997 16.89C5.30997 17.28 5.30997 17.91 5.69997 18.3C6.08997 18.69 6.71997 18.69 7.10997 18.3L12 13.41L16.89 18.3C17.28 18.69 17.91 18.69 18.3 18.3C18.69 17.91 18.69 17.28 18.3 16.89L13.41 12L18.3 7.10997C18.68 6.72997 18.68 6.08997 18.3 5.70997Z" fill="#2C5697" /> </svg> </button> </div> </li> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <button class="mega-menu__trigger" data-trigger="menu-consulting" aria-expanded="false" id="consulting-menu"> Consulting </button> <div class="mega-menu" data-menu="menu-consulting" hidden aria-labelledby="#consulting-menu"> <div class="mega-menu__inner"> <div class="mega-menu__grid"> <div class="mega-menu__grid-column"> <h2 class="h3"> Consulting </h2> </div> <div class="mega-menu__grid-column"> <div class="mega-menu__parent-menu mega-menu__parent-menu--parents-children"> <ul> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/consulting"> <span> Consulting Overview </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/actuarial-services"> <span> Actuarial Services </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/benefit-audit-services"> <span> Healthcare Claim Audit Services </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/health-and-welfare-consulting"> <span> Health and Welfare </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/mergers-and-acquisitions-consulting"> <span> Mergers and Acquisitions </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/pharmacy-consulting"> <span> Pharmacy Consulting </span> </a> </li> <li class="mega-menu__parent-menu-item"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/retirement-plan-consulting"> <span> Retirement Benefits </span> </a> </li> </ul> </div> </div> </div> </div> <button class="mega-menu__close-btn" aria-label="Close"> <svg width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M18.3 5.70997C17.91 5.31997 17.28 5.31997 16.89 5.70997L12 10.59L7.10997 5.69997C6.71997 5.30997 6.08997 5.30997 5.69997 5.69997C5.30997 6.08997 5.30997 6.71997 5.69997 7.10997L10.59 12L5.69997 16.89C5.30997 17.28 5.30997 17.91 5.69997 18.3C6.08997 18.69 6.71997 18.69 7.10997 18.3L12 13.41L16.89 18.3C17.28 18.69 17.91 18.69 18.3 18.3C18.69 17.91 18.69 17.28 18.3 16.89L13.41 12L18.3 7.10997C18.68 6.72997 18.68 6.08997 18.3 5.70997Z" fill="#2C5697" /> </svg> </button> </div> </li> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <button class="mega-menu__trigger" data-trigger="menu-news-and-insights" aria-expanded="false" id="news and insights-menu"> News and Insights </button> <div class="mega-menu" data-menu="menu-news-and-insights" hidden aria-labelledby="#news and insights-menu"> <div class="mega-menu__inner"> <div class="mega-menu__grid"> <div class="mega-menu__grid-column"> <h2 class="h3"> News and Insights </h2> </div> <div class="mega-menu__grid-column"> <div class="mega-menu__parent-menu mega-menu__parent-menu--parent-only"> <ul class="mega-menu__parent-menu-list mega-menu__parent-menu-list--large"> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/insights"> <span> All Insights </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/blog"> <span> Blog </span> </a> </li> <li class=" active-branch"> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/insights/emergency-resource-center"> <span> Emergency Resource... </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/employee-benefits-compliance/blog"> <span> Employee Benefits Compliance Center </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/events"> <span> Events </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/media"> <span> Media Coverage </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/insights/market-outlook"> <span> State of the Market Reports </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/press-releases"> <span> Press Releases </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/privateclientresources"> <span> Private Client Resources </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/insights/webinar-resources"> <span> Webinars </span> </a> </li> </ul> </div> </div> </div> </div> <button class="mega-menu__close-btn" aria-label="Close"> <svg width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M18.3 5.70997C17.91 5.31997 17.28 5.31997 16.89 5.70997L12 10.59L7.10997 5.69997C6.71997 5.30997 6.08997 5.30997 5.69997 5.69997C5.30997 6.08997 5.30997 6.71997 5.69997 7.10997L10.59 12L5.69997 16.89C5.30997 17.28 5.30997 17.91 5.69997 18.3C6.08997 18.69 6.71997 18.69 7.10997 18.3L12 13.41L16.89 18.3C17.28 18.69 17.91 18.69 18.3 18.3C18.69 17.91 18.69 17.28 18.3 16.89L13.41 12L18.3 7.10997C18.68 6.72997 18.68 6.08997 18.3 5.70997Z" fill="#2C5697" /> </svg> </button> </div> </li> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <button class="mega-menu__trigger" data-trigger="menu-company" aria-expanded="false" id="company-menu"> Company </button> <div class="mega-menu" data-menu="menu-company" hidden aria-labelledby="#company-menu"> <div class="mega-menu__inner"> <div class="mega-menu__grid"> <div class="mega-menu__grid-column"> <h2 class="h3"> Company </h2> </div> <div class="mega-menu__grid-column"> <div class="mega-menu__parent-menu mega-menu__parent-menu--parent-only"> <ul class="mega-menu__parent-menu-list mega-menu__parent-menu-list--large"> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/about/"> <span> About Us </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/annual-report"> <span> Annual Report </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/careers/"> <span> Careers </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/core-values/"> <span> Culture and Values </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/diversity-equity-and-inclusion"> <span> Diversity, Equity & Inclusion </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/environmental/"> <span> Environmental, Social, & Governance </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/general-terms-of-business"> <span> General Terms of Business </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/leaders"> <span> Leaders </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/local-expertise"> <span> Local Expertise </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/mergers-and-acquisitions/"> <span> Mergers & Acquisitions </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/awards"> <span> Recognition & Awards </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/risk-strategies-foundation"> <span> Risk Strategies Foundation </span> </a> </li> <li class=""> <a class="mega-menu__parent-menu-link" href="https://www.risk-strategies.com/company/transparency-and-disclosures"> <span> Transparency and Disclosures </span> </a> </li> </ul> </div> </div> </div> </div> <button class="mega-menu__close-btn" aria-label="Close"> <svg width="24" height="24" viewbox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M18.3 5.70997C17.91 5.31997 17.28 5.31997 16.89 5.70997L12 10.59L7.10997 5.69997C6.71997 5.30997 6.08997 5.30997 5.69997 5.69997C5.30997 6.08997 5.30997 6.71997 5.69997 7.10997L10.59 12L5.69997 16.89C5.30997 17.28 5.30997 17.91 5.69997 18.3C6.08997 18.69 6.71997 18.69 7.10997 18.3L12 13.41L16.89 18.3C17.28 18.69 17.91 18.69 18.3 18.3C18.69 17.91 18.69 17.28 18.3 16.89L13.41 12L18.3 7.10997C18.68 6.72997 18.68 6.08997 18.3 5.70997Z" fill="#2C5697" /> </svg> </button> </div> </li> </ul> </div> </div> </div> <div class="site-header__bottom-right"> <div class="site-header__search"> <button class="site-header__search-trigger" aria-label="Search"> <span class="site-header__search-trigger-icon site-header__search-trigger-icon--closed"> <svg width="25" height="24" viewbox="0 0 25 24" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M21.0887 18.5988L16.8805 14.3906C17.8374 12.97 18.3096 11.1949 18.0568 9.30351C17.6258 6.08637 14.9891 3.46828 11.7688 3.06058C6.98084 2.45473 2.95475 6.48082 3.56063 11.2687C3.96844 14.4905 6.58688 17.1293 9.80438 17.5582C11.6958 17.8109 13.4712 17.339 14.8915 16.3819L19.0997 20.5901C19.6488 21.1392 20.5393 21.1392 21.0885 20.5901C21.6371 20.0402 21.6371 19.1473 21.0887 18.5988ZM6.28088 10.3125C6.28088 7.83117 8.29955 5.8125 10.7809 5.8125C13.2622 5.8125 15.2809 7.83117 15.2809 10.3125C15.2809 12.7938 13.2622 14.8125 10.7809 14.8125C8.29955 14.8125 6.28088 12.7945 6.28088 10.3125Z" fill="#2C5697" /> </svg> </span> </button> <div class="site-header__search-dropdown"> <div class="site-header__search-dropdown-inner"> <form action="/hs-search-results"> <div class="hs-search-field__bar-input"> <svg width="32" height="32" viewbox="0 0 32 32" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M27.4516 24.7984L21.8406 19.1875C23.1166 17.2933 23.7461 14.9266 23.4091 12.4047C22.8344 8.11517 19.3187 4.62439 15.025 4.08078C8.64109 3.27298 3.27297 8.6411 4.08081 15.025C4.62456 19.3206 8.11581 22.8391 12.4058 23.4109C14.9277 23.7479 17.2949 23.1186 19.1886 21.8425L24.7996 27.4534C25.5317 28.1856 26.7191 28.1856 27.4513 27.4534C28.1828 26.7203 28.1828 25.5297 27.4516 24.7984ZM7.70781 13.75C7.70781 10.4416 10.3994 7.75001 13.7078 7.75001C17.0162 7.75001 19.7078 10.4416 19.7078 13.75C19.7078 17.0584 17.0162 19.75 13.7078 19.75C10.3994 19.75 7.70781 17.0594 7.70781 13.75Z" fill="#4D4E4B" /> </svg> <input type="text" class="hs-search-field__input site-header__search-bar-input" name="term" autocomplete="off" aria-label="" placeholder="Search www.risk-strategies.com"> <input type="hidden" name="type" value="SITE_PAGE"> <input type="hidden" name="type" value="LANDING_PAGE"> <input type="hidden" name="type" value="BLOG_POST"> <input type="hidden" name="type" value="LISTING_PAGE"> </div> <div class="hs-search-field__bar-submit"> <input class="cta-btn cta-btn--large cta-btn--tertiary-fill" type="submit" value="Search"> </div> </form> </div> </div> </div> <div class="site-header__cta-menu"> <div class="hs-menu-wrapper"> <ul> <li class="hs-menu-item hs-menu-depth-1 hs-item-has-children"> <a href="https://www.risk-strategies.com/careers/" role="button"> Join Us </a> <ul class="hs-menu-children-wrapper"> <li class="hs-menu-item hs-menu-depth-2 hs-item-has-children"> <a href="https://www.risk-strategies.com/careers/"> Careers </a> </li> <li class="hs-menu-item hs-menu-depth-2 hs-item-has-children"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/"> Mergers & Acquisitions </a> </li> </ul> </li> </ul> </div> </div> <div class="menu-trigger__container"> <button class="menu-trigger__button" id="mobile-menu-toggle" aria-expanded="false" aria-controls="mobile-menu"> <div class="inner"> <span class="menu-trigger__icon"></span> <span class="menu-trigger__label">Menu</span> </div> </button> </div> </div> </div> </div> </header> <div id="mobile-menu" class="mobile-menu"> <div class="inner"> <div class="mobile-menu__top"> <div class="mobile-menu__main"> <div class="hs-menu-wrapper"> <ul> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> Industries </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries?hsLang=en"> Industries </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/agriculture/?hsLang=en"> Agriculture </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/architects-engineers?hsLang=en"> Architects & Engineers </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Aviation </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Aviation </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/aviation?hsLang=en"> Aviation </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/aviation/aviation-business-insurance?hsLang=en"> Aviation Business Insurance - Manned Risk </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/aviation/non-owned-aviation?hsLang=en"> Non-Owned Aviation </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/aviation/unmanned-aerial-system-and-drone?hsLang=en"> Unmanned Aerial System and Drones </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/cannabis?hsLang=en"> Cannabis </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Construction </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Construction </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/construction?hsLang=en"> Construction </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/construction/alternative-solutions?hsLang=en"> Alternative Solutions </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/construction/financing-and-pre-construction?hsLang=en"> Financing & Pre-Construction </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/construction/insurance-solutions?hsLang=en"> Insurance Solutions </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/construction/risk-management?hsLang=en"> Risk Management </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/construction/surety?hsLang=en"> Surety </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Dental </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Dental </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/dental?hsLang=en"> Dental </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/dental-malpractice-insurance?hsLang=en"> Dental Malpractice Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/malpractice-insurance-dental-school-graduates-new-dentists?hsLang=en"> Dental School Graduates </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/malpractice-insurance-dental-associates-hygienists?hsLang=en"> Dental Associates & Hygienists </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/liability-insurance-dental-practice-owners?hsLang=en"> Dental Practice Owners </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/malpractice-insurance-dental-groups-multi-locations?hsLang=en"> Dental Groups & Multi-Locations </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Education </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Education </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/education/?hsLang=en"> Education </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/education/employee-benefits?hsLang=en"> Employee Benefits for Education </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/education/property-casualty-liability-risk-management?hsLang=en"> Property, Casualty & Liability for Education </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Student Health & Wellness </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Student Health & Wellness </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/industries/education/student-health?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Student Health & Wellness </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/industries/education/student-health-wellness-brokerage-consulting-services?hsLang=en"> Student Health Brokerage and Consulting </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/education/student-health-wellness-plan-administration?hsLang=en"> Student Health Plan Administration </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/education/student-health-insurance?hsLang=en"> Student Health Insurance Plans </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/education/student-athlete-accident-insurance-and-wellbeing-programs?hsLang=en"> Solutions for Student Athletes </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/education/student-health-wellness-tools-and-programs?hsLang=en"> Student Health & Wellness Tools </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/education/special-risk-insurance-for-college-students?hsLang=en"> Special Risk Insurance </a> </li> </ul> </div> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Entertainment </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Entertainment </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/entertainment/?hsLang=en"> Entertainment </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/film-television?hsLang=en"> Film & Television </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/advertising-production-wrap-ups?hsLang=en"> Advertising Production Wrap Ups </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/media-advertising-pr?hsLang=en"> Advertising/PR </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/event-cancellation-and-non-appearance?hsLang=en"> Event Cancellation & Non-Appearance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/music?hsLang=en"> Music & Touring </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/entertainment/theatre-plays?hsLang=en"> Theatrical Production & Live Performance </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Financial Services </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Financial Services </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/financial-services/?hsLang=en"> Financial Services </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/asset-managers?hsLang=en"> Asset Managers </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/banks-and-non-bank-lending?hsLang=en"> Banks & Non-Bank Lending </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/collections?hsLang=en"> Collections </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/consumer-financial-services?hsLang=en"> Consumer Financial Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/financial-tech?hsLang=en"> Financial Tech </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/financial-services/insurance-companies?hsLang=en"> Insurance Companies </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Fine Art </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Fine Art </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/fine-art/?hsLang=en"> Fine Art </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/artists?hsLang=en"> Artists </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/artist-endowed-foundation?hsLang=en"> Artist Endowed Foundations </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/auction-house?hsLang=en"> Auction Houses </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/packer?hsLang=en"> Fine Art Packers / Shippers / Warehouses </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/gallery?hsLang=en"> Galleries </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/museum-insurance?hsLang=en"> Museums </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/fine-art/private-art-dealers?hsLang=en"> Private Art Dealers / Advisors </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/fine-art/private-collectors?hsLang=en"> Private Collectors </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Healthcare </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Healthcare </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/healthcare/?hsLang=en"> Healthcare </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/healthcare/benefits?hsLang=en"> Employee Benefits - Healthcare </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/healthcare/managed-care?hsLang=en"> Managed Care / Stop Loss </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/healthcare/medical-malpractice?hsLang=en"> Medical Malpractice </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/healthcare/property-and-casualty?hsLang=en"> Property & Casualty - Healthcare </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/healthcare/reinsurance?hsLang=en"> Reinsurance </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/law-firms?hsLang=en"> Law Firms </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Marine & Yacht </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Marine & Yacht </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/marine-yacht/?hsLang=en"> Marine & Yacht </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/individuals?hsLang=en"> Boat & Yacht For Individuals </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Commercial & Recreational Marine Businesses </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Commercial & Recreational Marine Businesses </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/industries/marine-yacht/commercial?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Commercial & Recreational Marine Businesses </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/industries/marine-yacht/marine-businesses?hsLang=en"> Marine Businesses </a> </li> <li class=""> <a href="https://www.risk-strategies.com/industries/marine-yacht/sailing-organizations-burgee-program?hsLang=en"> Sailing Organizations - Burgee Program </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/jackline-program-cruising?hsLang=en"> Jackline Insurance Solutions for Cruisers </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/mega-yachts?hsLang=en"> Mega Yachts </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/one-design-insurance-program?hsLang=en"> One-Design Insurance Program </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/crewmedical?hsLang=en"> Crew Medical Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/sailors-health-insurance-program-for-us-sailing-members?hsLang=en"> Sailors Health Insurance Program </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/travel-medical-and-trip-insurance?hsLang=en"> Travel Medical & Trip Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/marine-yacht/us-sailing-programs?hsLang=en"> US Sailing Insurance Solutions </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/nonprofit/?hsLang=en"> Nonprofit & Human Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Private Equity </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Private Equity </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/private-equity?hsLang=en"> Private Equity </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/private-equity/crypto-companies?hsLang=en"> Crypto Companies </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Public Sector </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Public Sector </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/public-sector?hsLang=en"> Public Sector </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/public-sector/public-safety-and-municipalities?hsLang=en"> Public Safety Organizations & Municipalities </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Real Estate </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Real Estate </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/real-estate?hsLang=en"> Real Estate </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/commercial-real-estate?hsLang=en"> Commercial </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/community-associations?hsLang=en"> Community Associations </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/hospitality?hsLang=en"> Hospitality </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/residential-habitational?hsLang=en"> Residential / Habitational </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/reits?hsLang=en"> REITs </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/retail?hsLang=en"> Retail </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/real-estate/specialty-programs?hsLang=en"> Specialty Programs </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Relocation </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Relocation </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/relocation?hsLang=en"> Relocation </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/domestic-household-goods?hsLang=en"> Domestic Household Goods </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/expatriate-renters-liability?hsLang=en"> Expat Renters & Living Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/household-goods-claims-administration?hsLang=en"> Relocation Claims Service </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/international-household-goods?hsLang=en"> International Household Goods </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/supplemental-movers-coverage?hsLang=en"> Supplemental Movers Coverage </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/temporary-renters?hsLang=en"> Temporary Living Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/relocation/vacant-home?hsLang=en"> Vacant Home </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Transportation </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Transportation </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/industries/transportation/?hsLang=en"> Transportation </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/transportation/business-auto-insurance?hsLang=en"> Business Auto Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/transportation/last-mile-delivery?hsLang=en"> Last Mile Delivery </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/transportation/gig-economy-while-under-dispatch-insurance?hsLang=en"> While Under Dispatch Insurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/transportation/forwarding-and-brokering?hsLang=en"> Forwarding & Brokering </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/transportation/workers-compensation?hsLang=en"> Workers' Compensation </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/waste-and-recycling?hsLang=en"> Waste & Recycling </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/wineries-vineyards?hsLang=en"> Wineries </a> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> Solutions </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/solutions?hsLang=en"> Solutions </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Business Insurance </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Business Insurance </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/business-insurance/?hsLang=en"> Business Insurance </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/business-insurance/captives?hsLang=en"> Captives </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Casualty </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Casualty </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/business-insurance/casualty?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Casualty </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/analytics?hsLang=en"> Analytics </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/auto-liability-and-physical-damage?hsLang=en"> Auto Liability & Physical Damage </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/captives-and-alternatives-risk-financing?hsLang=en"> Captives & Alternative Risk Financing </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/claims-advocacy-and-loss-control?hsLang=en"> Claims Advocacy & Loss Control </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/excess-liability?hsLang=en"> Excess Liability </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/general-liability?hsLang=en"> General Liability </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/product-recall?hsLang=en"> Product Recall </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/casualty/workers-compensation?hsLang=en"> Workers' Compensation </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Cyber </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Cyber </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/business-insurance/cyber-risk?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Cyber </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/cyber-resolute?hsLang=en"> Cyber Resolute </a> </li> <li class=""> <a href="https://www.risk-strategies.com/cyber-risk-assessment-and-analytics?hsLang=en"> Cyber Risk Assessment and Analytics </a> </li> <li class=""> <a href="https://www.risk-strategies.com/cyber/dedicated-cyber-risk-response-and-claims-advocacy?hsLang=en"> Cyber Risk Response & Claims Advocacy </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Environmental </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Environmental </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/business-insurance/environmental?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Environmental </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/environmental/contractors-pollution?hsLang=en"> Contractors Pollution Liability </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/environmental-excess?hsLang=en"> Environmental Excess </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental-liability-transfer?hsLang=en"> Environmental Liability Transfer </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/healthcare?hsLang=en"> Environmental Liability - Healthcare </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/higher-education?hsLang=en"> Environmental Liability - Higher Education </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/pollution-legal-liability?hsLang=en"> Pollution Legal Liability </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/private-equity?hsLang=en"> Environmental Liability - Private Equity </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/professional-environmental-liability-insurance?hsLang=en"> Professional Environmental Liability Insurance </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/real-estate-development?hsLang=en"> Real Estate Development </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/remediation-cost-cap?hsLang=en"> Remediation Cost Cap </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/secured-creditor-protection-for-lenders?hsLang=en"> Secured Creditor Protection for Lenders </a> </li> <li class=""> <a href="https://www.risk-strategies.com/environmental/underground-storage-tanks?hsLang=en"> Underground Storage Tanks </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/business-insurance/international?hsLang=en"> International </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Management Liability </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Management Liability </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/business-insurance/management-liability?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Management Liability </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/management-liability/entertainment-industry?hsLang=en"> Management Liability - Entertainment </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/management-liability/financial-institutions?hsLang=en"> Management Liability - Financial Institutions </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/management-liability/healthcare-industry?hsLang=en"> Management Liability - Healthcare </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/management-liability/real-estate-industry?hsLang=en"> Management Liability - Real Estate </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <button class="mobile-menu__panel-btn mobile-menu__tier-3-panel-btn" data-level="3"> Property </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-3-back-btn" data-level="2"> Back to Property </button> <div> <div class="mobile-menu__intro-title"> <a class="h4" href="https://www.risk-strategies.com/business-insurance/property?hsLang=en" style="text-decoration: none; margin: 5px 0 0"> Property </a> </div> </div> <ul class="mobile-menu__subpanel-menu"> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/builders-risk?hsLang=en"> Builder's Risk </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/property/claims-services?hsLang=en"> Property Claims Services </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/inland-and-ocean-marine?hsLang=en"> Inland Transit and Ocean Cargo </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/property/natural-catastrophe-modelling-and-solutions?hsLang=en"> Natural Hazard Catastrophe Modeling </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/political-violence-and-terrorism?hsLang=en"> Political Violence and Terrorism </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/property/property-damage-and-business-interruptions-valuation?hsLang=en"> Property Damage & Business Interruptions Valuations </a> </li> <li class=""> <a href="https://www.risk-strategies.com/business-insurance/property-loss-prevention-and-control-services?hsLang=en"> Property Loss Prevention and Control </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/business-insurance/surety?hsLang=en"> Surety </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Employee Benefits </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Employee Benefits </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/employee-benefits/?hsLang=en"> Employee Benefits </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/?hsLang=en"> Employee Benefits Overview </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/benefit-administration-technology?hsLang=en"> Benefit Administration and Technology </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/benefits-compliance-support?hsLang=en"> Benefits Compliance Support </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/data-and-analytics?hsLang=en"> Data & Analytics </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/human-capital-advisory-services?hsLang=en"> Human Capital Advisory Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/international-benefits?hsLang=en"> International Benefits </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/absence-management-and-ancillary-program?hsLang=en"> Absence Management & Ancillary Programs </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/employee-benefits/voluntary-and-lifestyle-benefits?hsLang=en"> Voluntary & Lifestyle Benefits </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/medicare?hsLang=en"> Medicare </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Financial & Wealth </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Financial & Wealth </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/financial-wealth/?hsLang=en"> Financial & Wealth </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/financial-wealth/?hsLang=en"> Financial & Wealth Overview </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/financial-wealth/life-insurance?hsLang=en"> Life Insurance </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Private Client Services </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Private Client Services </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/private-client-services?hsLang=en"> Private Client Services </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services?hsLang=en"> Private Client Services Overview </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/home-estate/?hsLang=en"> Homeowners </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/flood-insurance?hsLang=en"> Flood </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/collections/?hsLang=en"> Collections </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/umbrella-excess-liability?hsLang=en"> Umbrella & Excess Liability </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/auto?hsLang=en"> Auto </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/collector-car-insurance?hsLang=en"> Collector & Exotic Car </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/marine-yacht/individuals?hsLang=en"> Boat & Yacht </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/family-office?hsLang=en"> Family Office </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/private-client-services/specialty-coverages/?hsLang=en"> Specialty Coverages </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/privateclientresources?hsLang=en"> Private Client Risk Resource Center </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/industries/healthcare/reinsurance?hsLang=en"> Reinsurance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Risk Management Services </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Risk Management Services </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/risk-management-services/?hsLang=en"> Risk Management Services </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/risk-management-services/?hsLang=en"> Risk Management Services Overview </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/risk-management-services/analytics/?hsLang=en"> Analytics </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/risk-management-services/claims/?hsLang=en"> Claims Management & Advocacy </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/risk-management-services/loss-control/?hsLang=en"> Loss Control </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/industries/risk-management/safety-services?hsLang=en"> Safety Consulting Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/pro-safety-training-course-catalog?hsLang=en"> Pro Safety Training Courses </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/workers-comp-insurance-premium-review-recovery?hsLang=en"> Workers’ Comp: Premium Review & Recovery </a> </li> </ul> </div> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> Consulting </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/consulting?hsLang=en"> Consulting </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/consulting?hsLang=en"> Consulting Overview </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/actuarial-services?hsLang=en"> Actuarial Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/benefit-audit-services?hsLang=en"> Healthcare Claim Audit Services </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/health-and-welfare-consulting?hsLang=en"> Health and Welfare </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions-consulting?hsLang=en"> Mergers and Acquisitions </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/pharmacy-consulting?hsLang=en"> Pharmacy Consulting </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/retirement-plan-consulting?hsLang=en"> Retirement Benefits </a> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> News and Insights </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/insights?hsLang=en"> News and Insights </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/insights?hsLang=en"> All Insights </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/blog?hsLang=en"> Blog </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Emergency Resource Centers </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Emergency Resource Centers </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center?hsLang=en"> Emergency Resource Centers </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/cybersecurity"> Cybersecurity </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/earthquake?hsLang=en"> Earthquake </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/hurricane?hsLang=en"> Hurricane </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/pandemic?hsLang=en"> Pandemic </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/riot-and-civil-unrest?hsLang=en"> Riot & Civil Unrest </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/severe-storms?hsLang=en"> Severe Storms </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/active-assailant-and-violence?hsLang=en"> Violence & Active Shooter </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/wildfire?hsLang=en"> Wildfire </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/insights/emergency-resource-center/winter-weather?hsLang=en"> Winter Weather </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/employee-benefits-compliance/blog?hsLang=en"> Employee Benefits Compliance Center </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/events?hsLang=en"> Events </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/media?hsLang=en"> Media Coverage </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/insights/market-outlook?hsLang=en"> State of the Market Reports </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/press-releases?hsLang=en"> Press Releases </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/privateclientresources?hsLang=en"> Private Client Resources </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/insights/webinar-resources?hsLang=en"> Webinars </a> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> Company </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/about/?hsLang=en"> Company </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/about/?hsLang=en"> About Us </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/annual-report?hsLang=en"> Annual Report </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/careers/?hsLang=en"> Careers </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/core-values/?hsLang=en"> Culture and Values </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Diversity, Equity & Inclusion </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Diversity, Equity & Inclusion </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/company/diversity-equity-and-inclusion?hsLang=en"> Diversity, Equity & Inclusion </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/company/diversity-equity-and-inclusion/be-heard?hsLang=en"> BeHEARD Series </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/company/diversity-equity-and-inclusion/structure?hsLang=en"> DE&I Structure </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/company/diversity-equity-and-inclusion/employee-resource-groups?hsLang=en"> Employee Resource Groups </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/environmental/?hsLang=en"> Environmental, Social, & Governance </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/general-terms-of-business?hsLang=en"> General Terms of Business </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/leaders?hsLang=en"> Leaders </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/local-expertise?hsLang=en"> Local Expertise </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/?hsLang=en"> Mergers & Acquisitions </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/awards?hsLang=en"> Recognition & Awards </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <a href="https://www.risk-strategies.com/company/risk-strategies-foundation?hsLang=en"> Risk Strategies Foundation </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Transparency and Disclosures </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Transparency and Disclosures </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/company/transparency-and-disclosures?hsLang=en"> Transparency and Disclosures </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/company/general-terms-of-business?hsLang=en"> General Terms of Business </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/company/conflict-of-interest-policy?hsLang=en"> Conflict of Interest Policy </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/about/transparency-and-disclosures/compensation-disclosure?hsLang=en"> Compensation Disclosure </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/about/transparency-and-disclosures/enterprise-risk-management?hsLang=en"> Enterprise Risk Management </a> </li> </ul> </div> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-1"> <button class="mobile-menu__panel-btn mobile-menu__tier-1-panel-btn" data-level="1"> Join Us </button> <div class="mobile-menu__subpanel"> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-1"> <button class="mobile-menu__back-btn mobile-menu__tier-1-back-btn" data-level="0"> Back to Main </button> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/careers/?hsLang=en"> Join Us </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Careers </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Careers </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/careers/?hsLang=en"> Careers </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/careers/benefits-wellness?hsLang=en"> Benefits & Wellness </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/careers/growth-leadership-investment?hsLang=en"> Investing in Growth & Leadership </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/careers/life/?hsLang=en"> Life at Risk Strategies </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/careers/next-steps?hsLang=en"> Next Steps </a> </li> </ul> </div> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-2"> <button class="mobile-menu__panel-btn mobile-menu__tier-2-panel-btn" data-level="2"> Mergers & Acquisitions </button> <div class="mobile-menu__subpanel"> <button class="mobile-menu__back-btn mobile-menu__tier-2-back-btn" data-level="1"> Back to Mergers & Acquisitions </button> <div class="mobile-menu__subpanel-intro mobile-menu__subpanel-intro--depth-2"> <div class="mobile-menu__intro-title"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/?hsLang=en"> Mergers & Acquisitions </a> </div> </div> <ul class="mobile-menu__subbpanel-menu"> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/partnership-benefits?hsLang=en"> Partnership Benefits </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/why-join-us?hsLang=en"> Why Join Us? </a> </li> <li class="mobile-menu__panel mobile-menu__panel--depth-3"> <a href="https://www.risk-strategies.com/mergers-and-acquisitions/onboarding-and-integration?hsLang=en"> Onboarding & Integration </a> </li> </ul> </div> </li> </ul> <div class="mobile-menu__additional-links"> </div> </div> </li> </ul> </div> </div> </div> <div class="mobile-menu__bottom"> <div class="mobile-menu__search"> <div class="mobile-menu__search"> <div class="mobile-menu__search-dropdown"> <div class="mobile-menu__search-dropdown-inner"> <form action="/hs-search-results"> <div class="hs-search-field__bar-input"> <svg width="32" height="32" viewbox="0 0 32 32" fill="none" xmlns="http://www.w3.org/2000/svg"> <path d="M27.4516 24.7984L21.8406 19.1875C23.1166 17.2933 23.7461 14.9266 23.4091 12.4047C22.8344 8.11517 19.3187 4.62439 15.025 4.08078C8.64109 3.27298 3.27297 8.6411 4.08081 15.025C4.62456 19.3206 8.11581 22.8391 12.4058 23.4109C14.9277 23.7479 17.2949 23.1186 19.1886 21.8425L24.7996 27.4534C25.5317 28.1856 26.7191 28.1856 27.4513 27.4534C28.1828 26.7203 28.1828 25.5297 27.4516 24.7984ZM7.70781 13.75C7.70781 10.4416 10.3994 7.75001 13.7078 7.75001C17.0162 7.75001 19.7078 10.4416 19.7078 13.75C19.7078 17.0584 17.0162 19.75 13.7078 19.75C10.3994 19.75 7.70781 17.0594 7.70781 13.75Z" fill="#4D4E4B" /> </svg> <input type="text" class="hs-search-field__input mobile-menu__search-bar-input" name="term" autocomplete="off" aria-label="" placeholder="Search www.risk-strategies.com"> <input type="hidden" name="type" value="SITE_PAGE"> <input type="hidden" name="type" value="LANDING_PAGE"> <input type="hidden" name="type" value="BLOG_POST"> <input type="hidden" name="type" value="LISTING_PAGE"> </div> </form> </div> </div> </div> </div> <div class="mobile-menu__secondary"> <div class="hs-menu-wrapper"> <ul> <li class="hs-menu-item hs-menu-depth-1"> <a href="https://www.risk-strategies.com/careers/"> Careers </a> </li> <li class="hs-menu-item hs-menu-depth-1"> <a href="https://www.risk-strategies.com/report-claim"> Report a Claim </a> </li> <li class="hs-menu-item hs-menu-depth-1"> <a href="https://www.risk-strategies.com/clients"> Clients </a> </li> <li class="hs-menu-item hs-menu-depth-1"> <a href="https://www.risk-strategies.com/contact-us/"> Contact Us </a> </li> <li class="hs-menu-item hs-menu-depth-1"> <a href="https://www.risk-strategies.com/employee-portal"> Employees </a> </li> </ul> </div> </div> </div> </div> </div> <div class="modal hs-search-hidden" id="external-popup" style="display: none;" role="complementary" aria-label="Exernal Popup Notification"> <div tabindex="-1" data-a11y-dialog-hide></div> <div role="dialog"> <div class="modal__underlay"></div> <div class="modal__content-outer"> <div class="modal__content-inner"> <div class="modal__content-message"> <p class="h2" style="text-transform: none;">You are about to leave Risk Strategies website and view the content of an external website.</p> <p>You are leaving risk-strategies.com</p> <p>By accessing this link, you will be leaving Risk Strategies website and entering a website hosted by another party. Please be advised that you will no longer be subject to, or under the protection of, the privacy and security policies of Risk Strategies website. We encourage you to read and evaluate the privacy and security policies of the site you are entering, which may be different than those of Risk Strategies.</p> </div> <div class="modal__content-actions"> <a class="modal__content-actions-btn modal__accept-btn cta-btn cta-btn--medium cta-btn--primary-fill" target="_blank" aria-label="Accept terms and leave the website of Arbor Financial Credit Union"> <span class="modal__accept-btn-label">OK</span> </a> <button class="modal__content-actions-btn modal__cancel-btn cta-btn cta-btn--medium cta-btn--primary-stroke" data-a11y-dialog-hide aria-label="Cancel and remain on the website of Arbor Financial Credit Union"> <span class="modal__cancel-btn-label">Cancel</span> </button> </div> <div class="modal__content-footer"> </div> </div> </div> </div> </div> <div id="main-content"></div></div> <main class="body-container-wrapper"> <div class="main-content"> <span id="hs_cos_wrapper_main-content" class="hs_cos_wrapper hs_cos_wrapper_widget_container hs_cos_wrapper_type_widget_container" style="" data-hs-cos-general-type="widget_container" data-hs-cos-type="widget_container"><div id="hs_cos_wrapper_widget_81147747691" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="billboard module module--padding-top-large module--padding-bottom-large on-dark module--bg-primary module--has-bg-image-video"> <div class="module__underlay" aria-hidden="true"> <picture class="module__underlay-image"> <source media="(max-width: 360px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=720&name=cyber-criminal-working.jpg"> <source media="(max-width: 360px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=360&name=cyber-criminal-working.jpg"> <source media="(max-width: 480px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=960&name=cyber-criminal-working.jpg"> <source media="(max-width: 480px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=480&name=cyber-criminal-working.jpg"> <source media="(max-width: 767px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=1534&name=cyber-criminal-working.jpg"> <source media="(max-width: 767px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=767&name=cyber-criminal-working.jpg"> <source media="(max-width: 991px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=1982&name=cyber-criminal-working.jpg"> <source media="(max-width: 991px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=991&name=cyber-criminal-working.jpg"> <source media="(max-width: 1439px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=2878&name=cyber-criminal-working.jpg"> <source media="(max-width: 1439px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=1439&name=cyber-criminal-working.jpg"> <source media="(max-width: 1920px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=3200&name=cyber-criminal-working.jpg"> <source media="(max-width: 1920px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=1600&name=cyber-criminal-working.jpg"> <source media="(max-width: 1920px) and (-webkit-min-device-pixel-ratio: 1.5)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=3840&name=cyber-criminal-working.jpg"> <source media="(max-width: 1920px)" srcset="https://20256628.fs1.hubspotusercontent-na1.net/hub/20256628/hubfs/cyber-criminal-working.jpg?width=1920&name=cyber-criminal-working.jpg"> <img class="module__underlay-image-element module__underlay-image-element--middle-center module__underlay-image-element--cover" src="https://www.risk-strategies.com/hubfs/cyber-criminal-working.jpg" alt="background image"> </picture> </div> <div class="module__overlay module__overlay--strength-full module__overlay--type-gradient"></div> <div class="module__inner constrain"> <div class="module__section-main module__section-main--block-align-left"> <div class="module__content module__content--text-align-left constrain--6"> <div class="billboard__content-inner"> <h1 class="display--1">Cybersecurity Resources</h1> <p><!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f"><span class="hs-cta-node hs-cta-6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f" id="hs-cta-6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/20256628/6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f"><img class="hs-cta-img" id="hs-cta-img-6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/20256628/6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f.png" alt="Report a Claim"></a></span><script charset="utf-8" src="/hs/cta/cta/current.js"></script><script type="text/javascript"> hbspt.cta._relativeUrls=true;hbspt.cta.load(20256628, '6e0f394d-0dcd-4414-b8f6-7fe80b0edf6f', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p> </div> </div> </div> </div> </div> </div> <div id="hs_cos_wrapper_widget_1696522431780" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="resources module module--padding-top-xs module--padding-bottom-xxs module--bg-transparent"> <div class="module__inner constrain"> <div class="module__section-header module__section-header--block-align-left"> <div class="module__section-header-inner module__section-header-inner--text-align-left constrain--12"> <div class="module__section-header-grid"> <div> <h3>Resources</h3> </div> <div> <p><a class="cta-link cta-link--chevron" href="/insights?hsLang=en" rel="noopener">See more resources</a></p> </div> </div> </div> </div> <div class="module__section-main module__section-main--block-align-center"> <div class="module__content module__content--text-align-left constrain--12"> <div class="resources__grid"> <div class="resources__inner" data-is-empty="false"> <div class="module__grid module__grid--two-col"> <div class="resources__column" data-is-active="true" data-column-properties="{"type":null}"> <div class="resource-card resource-card--compact on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=450&height=250&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=225&height=125&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=450&height=250&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=675&height=375&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=900&height=500&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=1125&height=625&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg?width=1350&height=750&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297-Align-Top.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/hubfs/cyber-insurance-checklist.pdf?hsLang=en" target="_blank" aria-label="Review our Cyber Hygiene Checklist"> Cyber Hygiene: Checklist </a> </h3> <span class="resource-card__snippet"> Before underwriting or renewing cyber coverage, insurers are taking a deep look at each organization’s cyber practices. To qualify for coverage — and particularly, if you want the best rates and terms — you need the following resources and procedures in place. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"type":null}"> <div class="resource-card resource-card--compact on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=450&height=250&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=225&height=125&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=450&height=250&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=675&height=375&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=900&height=500&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=1125&height=625&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg?width=1350&height=750&name=Cyber-Private-Equity-New-Priority-Thumbnail-450-297.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/hubfs/20256628/Cyber%20-%20Private%20Equitys%20New%20Priority.pdf?hsLang=en" target="_blank" aria-label="Download our Cyber - Private Equity's New Priority resource"> Cyber - Private Equity's New Priority </a> </h3> <span class="resource-card__snippet"> Private equity firms need to consider the cybersecurity of their firm and their portfolio as a top priority. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div id="hs_cos_wrapper_widget_81147747692" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="resources module module--padding-top-small module--padding-bottom-small module--bg-light"> <div class="module__inner constrain"> <div class="module__section-header module__section-header--block-align-left"> <div class="module__section-header-inner module__section-header-inner--text-align-left constrain--12"> <div class="module__section-header-grid"> <div> <h3>Blog Posts</h3> </div> <div> <p><a class="cta-link cta-link--chevron" href="/insights?hsLang=en" rel="noopener">Visit the blog</a></p> </div> </div> </div> </div> <div class="module__section-main module__section-main--block-align-center"> <div class="module__content module__content--text-align-left constrain--12"> <div class="resources__filters resources__filters--top"> <div class="resources__filters-inner"> <div class="resources__filter resources__filter"> <label class="resources__filter-label" for="industry"> Industry </label> <div class="resources__filter-field resources__filter-field--dropdown"> <select class="resources__filter-input" name="industry" id="industry" aria-labelledby="label-industry"> <option value="*" selected>Industry</option> <option value=""AI"">AI</option> <option value=""Architects & Engineers"">Architects & Engineers</option> <option value=""Cyber"">Cyber</option> <option value=""Financial Services"">Financial Services</option> <option value=""Healthcare"">Healthcare</option> <option value=""Hospitality"">Hospitality</option> <option value=""Management Liability"">Management Liability</option> <option value=""Private Client"">Private Client</option> <option value=""Private Equity"">Private Equity</option> <option value=""Risk Management"">Risk Management</option> </select> </div> </div> <div class="resources__filter resources__filter"> <label class="resources__filter-label" for="type"> Type </label> <div class="resources__filter-field resources__filter-field--dropdown"> <select class="resources__filter-input" name="type" id="type" aria-labelledby="label-type"> <option value="*" selected>Type</option> <option value=""Blog Post"">Blog Post</option> </select> </div> </div> <div class="resources__filter resources__filter"> <label class="resources__filter-label" for="type"> Type </label> <div class="resources__filter-field resources__filter-field--dropdown"> <select class="resources__filter-input" name="type" id="type" aria-labelledby="label-type"> <option value="*" selected>All</option> </select> </div> </div> <div class="resources__filter resources__filter--search"> <label class="resources__filter-label" for="search">Search</label> <input class="resources__filter-input" type="text" name="search" id="search" placeholder="Search keywords, topics, type"> </div> </div> </div> <div class="resources__grid"> <div class="resources__inner" data-is-empty="false"> <div class="module__grid module__grid--four-col"> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Management Liability","Cyber"],"name":"DOJ’s Corporate Whistleblower Awards Pilot: Compliance & Risk Impact","snippet":"In August 2024, the U.S. Department of Justice (DOJ) launched its Corporate Whistleblower Awards Pilot Program to enhance corporate accountability. This program represents a shift from traditional securities law enforcement by the Securities and Exchange Commission (SEC). It has broad implications for companies of all sizes.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=450&height=250&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=225&height=125&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=450&height=250&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=675&height=375&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=900&height=500&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=1125&height=625&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg?width=1350&height=750&name=Businesswoman%20talking%20on%20phone%20from%20office%20window%20overlooking%20Hong%20Kong%20cityscape.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/doj-corporate-whistleblower-awards-pilot-compliance-risk-impact?hsLang=en" "> DOJ’s Corporate Whistleblower Awards Pilot: Compliance & Risk Impact </a> </h3> <span class="resource-card__snippet"> In August 2024, the U.S. Department of Justice (DOJ) launched its Corporate Whistleblower Awards Pilot Program to enhance corporate accountability. This program represents a shift from traditional securities law enforcement by the Securities and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Hospitality"],"name":"Cybersecurity Risks in Hospitality","snippet":"For many hospitality businesses, tech isn’t a strength and cybercriminals know it. While you’re busy creating great customer experiences, bad actors are looking for entry points to nab credit card data and gain access to your financial accounts. Here are cyber scenarios from restaurants and hotels, along with tips for improving cybersecurity hygiene.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=450&height=250&name=sharing-data-bluetooth-smartphones.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=225&height=125&name=sharing-data-bluetooth-smartphones.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=450&height=250&name=sharing-data-bluetooth-smartphones.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=675&height=375&name=sharing-data-bluetooth-smartphones.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=900&height=500&name=sharing-data-bluetooth-smartphones.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=1125&height=625&name=sharing-data-bluetooth-smartphones.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/sharing-data-bluetooth-smartphones.jpg?width=1350&height=750&name=sharing-data-bluetooth-smartphones.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cybersecurity-risks-in-hospitality?hsLang=en" "> Cybersecurity Risks in Hospitality </a> </h3> <span class="resource-card__snippet"> For many hospitality businesses, tech isn’t a strength and cybercriminals know it. While you’re busy creating great customer experiences, bad actors are looking for entry points to nab credit card data and gain access to your financial accounts. ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Risk Management"],"name":"Combating Surging Ransomware Attacks: Strategies for Universities and Colleges","snippet":"Universities and colleges are increasingly under siege by ransomware. In 2023 alone, ransomware attacks on higher education institutions surged by 70%, with 66% of universities falling victim to these cyber assaults.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=450&height=250&name=Computer%20classroom.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=225&height=125&name=Computer%20classroom.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=450&height=250&name=Computer%20classroom.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=675&height=375&name=Computer%20classroom.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=900&height=500&name=Computer%20classroom.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=1125&height=625&name=Computer%20classroom.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Computer%20classroom.jpg?width=1350&height=750&name=Computer%20classroom.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/combat-surging-ransomware-attacks-strategies-for-universities-colleges?hsLang=en" "> Combating Surging Ransomware Attacks: Strategies for Universities and Colleges </a> </h3> <span class="resource-card__snippet"> Universities and colleges are increasingly under siege by ransomware. In 2023 alone, ransomware attacks on higher education institutions surged by 70%, with 66% of universities falling victim to these cyber assaults. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cyber Resilience Lessons from the CrowdStrike Outage","snippet":"Editor's Note: This article originally appeared in Carrier Management. Reprinted with permission, this piece contains helpful tips for all organizations that rely on third-party software and firmware updates in their day-to-day operations.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=450&height=250&name=Airport%20Lost%20Luggage.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=225&height=125&name=Airport%20Lost%20Luggage.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=450&height=250&name=Airport%20Lost%20Luggage.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=675&height=375&name=Airport%20Lost%20Luggage.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=900&height=500&name=Airport%20Lost%20Luggage.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=1125&height=625&name=Airport%20Lost%20Luggage.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Airport%20Lost%20Luggage.jpg?width=1350&height=750&name=Airport%20Lost%20Luggage.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cyber-resilience-lessons-from-the-crowdstrike-outage?hsLang=en" "> Cyber Resilience Lessons from the CrowdStrike Outage </a> </h3> <span class="resource-card__snippet"> Editor's Note: This article originally appeared in Carrier Management. Reprinted with permission, this piece contains helpful tips for all organizations that rely on third-party software and firmware updates in their day-to-day operations. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Strengthening Cybersecurity in Car Dealerships: Lessons from the CDK Global Hack","snippet":"The recent cyberattack on CDK Global, which affected thousands of car dealerships nationwide, underscored significant vulnerabilities within industries in which a single vendor hack can disrupt entire swaths of the market, such as healthcare and fine arts. The incident disrupted daily operations and revealed critical weaknesses in the systems many dealerships rely on.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=450&height=250&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=225&height=125&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=450&height=250&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=675&height=375&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=900&height=500&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=1125&height=625&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg?width=1350&height=750&name=Close-up%20on%20a%20car%20salesperson%20using%20a%20tablet%20computer.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/lessons-from-the-cdk-global-cyberattack-auto-dealer-cybersecurity?hsLang=en" "> Strengthening Cybersecurity in Car Dealerships: Lessons from the CDK Global Hack </a> </h3> <span class="resource-card__snippet"> The recent cyberattack on CDK Global, which affected thousands of car dealerships nationwide, underscored significant vulnerabilities within industries in which a single vendor hack can disrupt entire swaths of the market, such as healthcare and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Building a Human Firewall: Strengthening Your Cybersecurity Defenses","snippet":"Cyber threats are escalating. Reports from IBM show that cyberattacks using stolen or compromised credentials surged by 71%, year-over-year in 2023, and 32% of cyber incidents involve data theft and leaks. This indicates a shift towards stealing and selling data rather than encrypting it for ransom. The human element is often the weakest link in cybersecurity risk management. Creating a \"human firewall\" can significantly fortify your business against these threats. To better understand this concept, let's explore the human factors that play a crucial role.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=450&height=250&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=225&height=125&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=450&height=250&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=675&height=375&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=900&height=500&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=1125&height=625&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg?width=1350&height=750&name=Cyber-security-firewall-interface-protection-human-firewall-cybersecurity.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/building-a-human-firewall-strengthening-your-cybersecurity-defenses?hsLang=en" "> Building a Human Firewall: Strengthening Your Cybersecurity Defenses </a> </h3> <span class="resource-card__snippet"> Cyber threats are escalating. Reports from IBM show that cyberattacks using stolen or compromised credentials surged by 71%, year-over-year in 2023, and 32% of cyber incidents involve data theft and leaks. This indicates a shift towards stealing and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Christie’s Auction House Hack and You","snippet":"The ongoing hack of Christie’s auction house immediately ahead of a planned $840M art sale is an abject lesson in the realities of risk in today’s internet-connected and dependent business world.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=450&height=250&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=225&height=125&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=450&height=250&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=675&height=375&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=900&height=500&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=1125&height=625&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg?width=1350&height=750&name=Digital%20generated%20image%20of%20electronic%20circuit%20security%20padlock.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-christies-auction-house-hack-and-you?hsLang=en" "> The Christie’s Auction House Hack and You </a> </h3> <span class="resource-card__snippet"> The ongoing hack of Christie’s auction house immediately ahead of a planned $840M art sale is an abject lesson in the realities of risk in today’s internet-connected and dependent business world. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","AI"],"name":"Protecting Your Business from Deepfake Threats","snippet":"Deepfake technology blurs the line between reality and fabrication. While sometimes used for entertainment purposes or as a novelty, deepfakes can be a dangerous tool for cybercriminals, enabling scams, blackmail, and misinformation. Learn more about this threat so you can proactively prepare and protect your business.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=450&height=250&name=Deepfake-AI.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=225&height=125&name=Deepfake-AI.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=450&height=250&name=Deepfake-AI.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=675&height=375&name=Deepfake-AI.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=900&height=500&name=Deepfake-AI.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=1125&height=625&name=Deepfake-AI.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Deepfake-AI.jpg?width=1350&height=750&name=Deepfake-AI.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/protecting-your-business-from-deepfake-threats?hsLang=en" "> Protecting Your Business from Deepfake Threats </a> </h3> <span class="resource-card__snippet"> Deepfake technology blurs the line between reality and fabrication. While sometimes used for entertainment purposes or as a novelty, deepfakes can be a dangerous tool for cybercriminals, enabling scams, blackmail, and misinformation. Learn more ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Change Healthcare Cyber Attack: Cybersecurity Lessons Learned","snippet":"Change Healthcare's recent cyber attack sparked a crucial discussion on cybersecurity, business continuity, and contingent liability insurance within the healthcare sector. Cyber attacks in healthcare have been increasing in severity, with far-reaching consequences for businesses, physicians, and insurers alike. Here are key observations and tips for protecting your organization.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=450&height=250&name=Security%20padlock%20and%20circuit%20board.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=225&height=125&name=Security%20padlock%20and%20circuit%20board.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=450&height=250&name=Security%20padlock%20and%20circuit%20board.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=675&height=375&name=Security%20padlock%20and%20circuit%20board.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=900&height=500&name=Security%20padlock%20and%20circuit%20board.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=1125&height=625&name=Security%20padlock%20and%20circuit%20board.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Security%20padlock%20and%20circuit%20board.jpg?width=1350&height=750&name=Security%20padlock%20and%20circuit%20board.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/change-healthcare-cyber-attack-cybersecurity-lessons-learned?hsLang=en" "> Change Healthcare Cyber Attack: Cybersecurity Lessons Learned </a> </h3> <span class="resource-card__snippet"> Change Healthcare's recent cyber attack sparked a crucial discussion on cybersecurity, business continuity, and contingent liability insurance within the healthcare sector. Cyber attacks in healthcare have been increasing in severity, with ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Understanding the 23andMe Data Breach and Ensuring Cybersecurity","snippet":"Companies like 23andMe have revolutionized accessibility to genetic information, promising personalized insights into health. However, with innovation comes notoriety and vulnerability, as highlighted by the recent data breach at 23andMe. This breach, affecting millions of users, serves as a stark reminder of the urgent need for robust cybersecurity measures and strong password management.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=450&height=250&name=DNA-Computer-Keyboard.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=225&height=125&name=DNA-Computer-Keyboard.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=450&height=250&name=DNA-Computer-Keyboard.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=675&height=375&name=DNA-Computer-Keyboard.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=900&height=500&name=DNA-Computer-Keyboard.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=1125&height=625&name=DNA-Computer-Keyboard.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/DNA-Computer-Keyboard.jpg?width=1350&height=750&name=DNA-Computer-Keyboard.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/understanding-the-23andme-data-breach-and-ensuring-cybersecurity?hsLang=en" "> Understanding the 23andMe Data Breach and Ensuring Cybersecurity </a> </h3> <span class="resource-card__snippet"> Companies like 23andMe have revolutionized accessibility to genetic information, promising personalized insights into health. However, with innovation comes notoriety and vulnerability, as highlighted by the recent data breach at 23andMe. This ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Don’t Take the Bait: How to Protect Against Phishing Scams","snippet":"When it comes to cyberattacks, companies of all sizes are only as strong as their weakest link. All it takes is one employee to mistakenly click on a link, and instantly a hacker can gain access to the firm’s network and all they hold dear.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=450&height=250&name=Phishing.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=225&height=125&name=Phishing.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=450&height=250&name=Phishing.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=675&height=375&name=Phishing.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=900&height=500&name=Phishing.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=1125&height=625&name=Phishing.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Phishing.gif?width=1350&height=750&name=Phishing.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/dont-take-the-bait-how-to-protect-against-phishing-scams?hsLang=en" "> Don’t Take the Bait: How to Protect Against Phishing Scams </a> </h3> <span class="resource-card__snippet"> When it comes to cyberattacks, companies of all sizes are only as strong as their weakest link. All it takes is one employee to mistakenly click on a link, and instantly a hacker can gain access to the firm’s network and all they hold dear. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Understanding the MGM and Caesars Cyberattacks: Lessons Learned","snippet":"Many of today’s increasingly devastating high-profile “cyberattacks” can actually be attributed to human error. The recent attacks on Caesars Entertainment and MGM Resorts stand as stark examples of this. Caesars reportedly paid a $15 million ransom to the attackers whereas MGM refused to pay, causing substantial interruptions to its operations.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=450&height=250&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=225&height=125&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=450&height=250&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=675&height=375&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=900&height=500&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=1125&height=625&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg?width=1350&height=750&name=Cyber%20MGM%20Hack%20Blog%20-%20Getty%20Image.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/understanding-mgm-and-caesars-cyberattacks-lessons-learned?hsLang=en" "> Understanding the MGM and Caesars Cyberattacks: Lessons Learned </a> </h3> <span class="resource-card__snippet"> Many of today’s increasingly devastating high-profile “cyberattacks” can actually be attributed to human error. The recent attacks on Caesars Entertainment and MGM Resorts stand as stark examples of this. Caesars reportedly paid a $15 million ransom ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","AI"],"name":"AI Might Strengthen Your Cybersecurity Program","snippet":"Artificial intelligence (AI) is rapidly transforming many industries. It’s already being used to improve cybersecurity and will likely have a major impact on cyber insurance coverage in the coming years.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=450&height=250&name=AI%20blog%20Image.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=225&height=125&name=AI%20blog%20Image.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=450&height=250&name=AI%20blog%20Image.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=675&height=375&name=AI%20blog%20Image.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=900&height=500&name=AI%20blog%20Image.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=1125&height=625&name=AI%20blog%20Image.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/AI%20blog%20Image.jpg?width=1350&height=750&name=AI%20blog%20Image.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ai-might-strengthen-your-cybersecurity-program?hsLang=en" "> AI Might Strengthen Your Cybersecurity Program </a> </h3> <span class="resource-card__snippet"> Artificial intelligence (AI) is rapidly transforming many industries. It’s already being used to improve cybersecurity and will likely have a major impact on cyber insurance coverage in the coming years. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Do You Know How to Spot a BEC Phishing Attack?","snippet":"0nly dumb people fall for email phishing attacks, right? 0f course, everyone thinks they’re immune. 0nly a tech neophyte would fail to pick up on a sketchy note – especially from a familiar source.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=450&height=250&name=GettyImages-1333378389.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=225&height=125&name=GettyImages-1333378389.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=450&height=250&name=GettyImages-1333378389.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=675&height=375&name=GettyImages-1333378389.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=900&height=500&name=GettyImages-1333378389.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=1125&height=625&name=GettyImages-1333378389.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1333378389.jpg?width=1350&height=750&name=GettyImages-1333378389.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/business-email-compromise-phishing-attacks-0?hsLang=en" "> Do You Know How to Spot a BEC Phishing Attack? </a> </h3> <span class="resource-card__snippet"> 0nly dumb people fall for email phishing attacks, right? 0f course, everyone thinks they’re immune. 0nly a tech neophyte would fail to pick up on a sketchy note – especially from a familiar source. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"SEC Cybersecurity Rules: Are You Prepared?","snippet":"Last month, the U.S. Securities and Exchange Commission (SEC) released updated requirements for reporting cybersecurity incidents. These regulations mandate that all publicly traded companies disclose “material” cyber events within four days of their discovery. The new SEC cybersecurity rules will take effect on December 15 for most organizations. Smaller entities will have until June 2024 to comply.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=450&height=250&name=Cyber%20-%20Blog%20-%208-29-2023.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=225&height=125&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=450&height=250&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=675&height=375&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=900&height=500&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=1125&height=625&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Blog%20-%208-29-2023.jpg?width=1350&height=750&name=Cyber%20-%20Blog%20-%208-29-2023.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/sec-cybersecurity-rules?hsLang=en" "> SEC Cybersecurity Rules: Are You Prepared? </a> </h3> <span class="resource-card__snippet"> Last month, the U.S. Securities and Exchange Commission (SEC) released updated requirements for reporting cybersecurity incidents. These regulations mandate that all publicly traded companies disclose “material” cyber events within four days of ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"How Small Businesses Can Avoid Cyberattacks","snippet":"Editor's Note: This cybersecurity article originally appeared in the Q3-2023 issue of Premier Flooring Retailer, a trade magazine published by the World Floor Covering Association. Reprinted with permission, this piece contains helpful tips for all small businesses, not just the flooring industry. Most small businesses rely on technology, but you may not consider yourself a technology expert. You’ve read news headlines about cyberattacks and know cybersecurity is important. Beyond that, you may think, “We’re not a huge company. Why would cybercriminals be interested in us?” Unfortunately, threat actors are targeting small and midsize organizations — in part because they assume you aren’t focused on cybersecurity.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=450&height=250&name=Blog-%20Cyber%208-10.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=225&height=125&name=Blog-%20Cyber%208-10.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=450&height=250&name=Blog-%20Cyber%208-10.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=675&height=375&name=Blog-%20Cyber%208-10.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=900&height=500&name=Blog-%20Cyber%208-10.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=1125&height=625&name=Blog-%20Cyber%208-10.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Blog-%20Cyber%208-10.jpg?width=1350&height=750&name=Blog-%20Cyber%208-10.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/preventing-small-business-cyberattacks?hsLang=en" "> How Small Businesses Can Avoid Cyberattacks </a> </h3> <span class="resource-card__snippet"> Editor's Note: This cybersecurity article originally appeared in the Q3-2023 issue of Premier Flooring Retailer, a trade magazine published by the World Floor Covering Association. Reprinted with permission, this piece contains helpful tips for all ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Ransomware Part II — Ignore Ransom Demands","snippet":"As discussed in Part I, How to Avoid a Ransomware Payment, insurers strongly discourage paying criminals. Meeting a ransom demand rarely brings relief for the victim, and it emboldens bad actors to continue this type of attack. If ransomware has blocked and locked your organization’s computers and files, you need to engage your legal counsel and insurance company immediately. Here’s an important reason to ignore ransom demands, along with tips for avoiding a ransomware attack in the first place.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=450&height=250&name=GettyImages-1418045834.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=225&height=125&name=GettyImages-1418045834.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=450&height=250&name=GettyImages-1418045834.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=675&height=375&name=GettyImages-1418045834.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=900&height=500&name=GettyImages-1418045834.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=1125&height=625&name=GettyImages-1418045834.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/GettyImages-1418045834.jpg?width=1350&height=750&name=GettyImages-1418045834.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ransomware-ignore-ransom-demand?hsLang=en" "> Ransomware Part II — Ignore Ransom Demands </a> </h3> <span class="resource-card__snippet"> As discussed in Part I, How to Avoid a Ransomware Payment, insurers strongly discourage paying criminals. Meeting a ransom demand rarely brings relief for the victim, and it emboldens bad actors to continue this type of attack. If ransomware has ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cyber Insurance and Social Engineering Attacks","snippet":"Criminals often use “social engineering” to groom victims and deceive them into transferring funds or sensitive data. If employees don’t recognize the hallmarks of a social engineering scam, they can easily expose your organization to substantial risk. These types of attacks can lead to a costly response and remediation process. So, insurers want to see specific precautions before issuing a cyber insurance policy.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=450&height=250&name=Transfer_Fraud_Alert.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=225&height=125&name=Transfer_Fraud_Alert.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=450&height=250&name=Transfer_Fraud_Alert.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=675&height=375&name=Transfer_Fraud_Alert.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=900&height=500&name=Transfer_Fraud_Alert.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=1125&height=625&name=Transfer_Fraud_Alert.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Transfer_Fraud_Alert.gif?width=1350&height=750&name=Transfer_Fraud_Alert.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cyber-insurance-social-engineering?hsLang=en" "> Cyber Insurance and Social Engineering Attacks </a> </h3> <span class="resource-card__snippet"> Criminals often use “social engineering” to groom victims and deceive them into transferring funds or sensitive data. If employees don’t recognize the hallmarks of a social engineering scam, they can easily expose your organization to substantial ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Private Client","Cyber"],"name":"The Growing Need for Personal Cyber Insurance","snippet":"Imagine this scenario: You wake up one day to find that your home network has been hacked. Personal photos, banking credentials, and other sensitive data are all compromised before you even have the chance to think or respond. And even worse, the hackers are now demanding a ransom in digital currency for the safe return of your sensitive information. You try to comply, but the event ultimately results in a loss of both finances, private information, and data. Having no personal cyber insurance to protect you or help you recover from such a cyberattack, you and your family are left on your own to navigate a path forward and pick up the pieces.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=450&height=250&name=Cyber-%20Getty.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=225&height=125&name=Cyber-%20Getty.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=450&height=250&name=Cyber-%20Getty.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=675&height=375&name=Cyber-%20Getty.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=900&height=500&name=Cyber-%20Getty.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=1125&height=625&name=Cyber-%20Getty.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber-%20Getty.jpg?width=1350&height=750&name=Cyber-%20Getty.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/personal-cyber-insurance?hsLang=en" "> The Growing Need for Personal Cyber Insurance </a> </h3> <span class="resource-card__snippet"> Imagine this scenario: You wake up one day to find that your home network has been hacked. Personal photos, banking credentials, and other sensitive data are all compromised before you even have the chance to think or respond. And even worse, the ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Don’t Buy a Cyber Policy","snippet":"The headline of this article probably strikes you as out of touch with the current state of the cyber marketplace. Both the frequency and severity of cyber-related claims are multiplying. Also, ransomware claims continue to escalate, and it’s estimated that 90% of US companies experienced a cyber-related event by the end of 2022.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=450&height=250&name=Do_Not_Buy-Image2.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=225&height=125&name=Do_Not_Buy-Image2.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=450&height=250&name=Do_Not_Buy-Image2.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=675&height=375&name=Do_Not_Buy-Image2.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=900&height=500&name=Do_Not_Buy-Image2.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=1125&height=625&name=Do_Not_Buy-Image2.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Do_Not_Buy-Image2.gif?width=1350&height=750&name=Do_Not_Buy-Image2.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/dont-buy-a-cyber-policy?hsLang=en" "> Don’t Buy a Cyber Policy </a> </h3> <span class="resource-card__snippet"> The headline of this article probably strikes you as out of touch with the current state of the cyber marketplace. Both the frequency and severity of cyber-related claims are multiplying. Also, ransomware claims continue to escalate, and it’s ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"How to Avoid a Ransomware Payment – Part I","snippet":"There is no getting around it; ransomware is here to stay. Ransomware is a type of malware (malicious software) that can be designed in many harmful forms. Cyber crooks use it to block and lock users from their computers and files until a ransom is paid. With many high-profile ransomware attacks in recent news headlines, we have all become familiar with these incidents.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=450&height=250&name=Cyber%20Ransomeware.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=225&height=125&name=Cyber%20Ransomeware.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=450&height=250&name=Cyber%20Ransomeware.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=675&height=375&name=Cyber%20Ransomeware.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=900&height=500&name=Cyber%20Ransomeware.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=1125&height=625&name=Cyber%20Ransomeware.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Ransomeware.jpg?width=1350&height=750&name=Cyber%20Ransomeware.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/how-to-avoid-a-ransomware-payment?hsLang=en" "> How to Avoid a Ransomware Payment – Part I </a> </h3> <span class="resource-card__snippet"> There is no getting around it; ransomware is here to stay. Ransomware is a type of malware (malicious software) that can be designed in many harmful forms. Cyber crooks use it to block and lock users from their computers and files until a ransom is ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"Pixel Tracking: Avoiding HIPAA Violations","snippet":"Capturing customer data is a popular practice, with websites using the information to generate revenue or conduct market research. One method of data capture known as “pixel tracking” involves collecting and tracking user information from web pages and marketing, newsletter, and transactional emails. Already in widespread use, pixel tracking has raised concerns in the healthcare industry due to the potential for indirect exposure of patients’ protected health information (PHI). A violation of privacy can run afoul of HIPAA regulations (Health Insurance Portability and Accountability Act).","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=450&height=250&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=225&height=125&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=450&height=250&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=675&height=375&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=900&height=500&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=1125&height=625&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20-%20Healthcar%20Blog%20Image.jpg?width=1350&height=750&name=Cyber%20-%20Healthcar%20Blog%20Image.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/pixel-tracking-hipaa-violations?hsLang=en" "> Pixel Tracking: Avoiding HIPAA Violations </a> </h3> <span class="resource-card__snippet"> Capturing customer data is a popular practice, with websites using the information to generate revenue or conduct market research. One method of data capture known as “pixel tracking” involves collecting and tracking user information from web pages ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Five Things You Need to Prepare for Cyber Renewals","snippet":"An insurance renewal is a great moment for assessment – what you’re doing well as an organization, things that are accelerating growth, coverage that is protecting your business, and areas where you may be lacking. This is especially true in the current hard market for cyber insurance. Carriers are being far more discerning and digging into controls to ensure that you’re making smart, proactive decisions to prepare for potential incidents.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=450&height=250&name=Cyber_Renewals.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=225&height=125&name=Cyber_Renewals.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=450&height=250&name=Cyber_Renewals.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=675&height=375&name=Cyber_Renewals.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=900&height=500&name=Cyber_Renewals.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=1125&height=625&name=Cyber_Renewals.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Renewals.gif?width=1350&height=750&name=Cyber_Renewals.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-five-things-you-need-to-prepare-for-cyber-renewals?hsLang=en" "> The Five Things You Need to Prepare for Cyber Renewals </a> </h3> <span class="resource-card__snippet"> An insurance renewal is a great moment for assessment – what you’re doing well as an organization, things that are accelerating growth, coverage that is protecting your business, and areas where you may be lacking. This is especially true in the ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"5 Tips for Managing Cyber Costs in 2023","snippet":"Your organization’s cyber maturity is a primary factor in determining insurability, coverage amounts, and pricing. A cyber-aware workforce and multi-factor authentication have become table stakes. Without these safeguards, your likelihood of getting a cyber policy is negligible.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=450&height=250&name=Cyber%20Security%20.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=225&height=125&name=Cyber%20Security%20.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=450&height=250&name=Cyber%20Security%20.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=675&height=375&name=Cyber%20Security%20.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=900&height=500&name=Cyber%20Security%20.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=1125&height=625&name=Cyber%20Security%20.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Security%20.jpg?width=1350&height=750&name=Cyber%20Security%20.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/5-tips-for-managing-cyber-costs-in-2023?hsLang=en" "> 5 Tips for Managing Cyber Costs in 2023 </a> </h3> <span class="resource-card__snippet"> Your organization’s cyber maturity is a primary factor in determining insurability, coverage amounts, and pricing. A cyber-aware workforce and multi-factor authentication have become table stakes. Without these safeguards, your likelihood of getting ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Financial Services"],"name":"Heightened Cyber Risk Amid Bank Failures","snippet":"The recent bank failures may trigger additional cyber risks and threats to businesses, particularly if you need to transition to new banking partners. Please be aware of the heightened risk of cyber bad actors using social engineering techniques and phishing attempts.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=450&height=250&name=Cyber.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=225&height=125&name=Cyber.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=450&height=250&name=Cyber.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=675&height=375&name=Cyber.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=900&height=500&name=Cyber.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=1125&height=625&name=Cyber.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber.jpg?width=1350&height=750&name=Cyber.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/heightened-cyber-risk-amid-bank-failures?hsLang=en" "> Heightened Cyber Risk Amid Bank Failures </a> </h3> <span class="resource-card__snippet"> The recent bank failures may trigger additional cyber risks and threats to businesses, particularly if you need to transition to new banking partners. Please be aware of the heightened risk of cyber bad actors using social engineering techniques and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"How Social Engineering Attacks Present Unique Risks for Health Care","snippet":"Social engineering scams have become more common and more costly—especially for health care organizations. These scams can result in significant financial and reputational loss, especially when an attack leads to a data breach. Digital transformation initiatives, mergers and acquisitions (M&amp;A), and the increasing prevalence of these scams all make organizations vulnerable. However, the greatest threat organizations face comes from their lack of awareness and understanding about how these scams work. It is becoming increasingly crucial to be vigilant and aware of the threats posed by social engineering scams.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=450&height=250&name=Doctor%20typing%20on%20laptop.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=225&height=125&name=Doctor%20typing%20on%20laptop.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=450&height=250&name=Doctor%20typing%20on%20laptop.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=675&height=375&name=Doctor%20typing%20on%20laptop.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=900&height=500&name=Doctor%20typing%20on%20laptop.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=1125&height=625&name=Doctor%20typing%20on%20laptop.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Doctor%20typing%20on%20laptop.jpg?width=1350&height=750&name=Doctor%20typing%20on%20laptop.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/how-social-engineering-attacks-present-unique-risks-for-health-care?hsLang=en" "> How Social Engineering Attacks Present Unique Risks for Health Care </a> </h3> <span class="resource-card__snippet"> Social engineering scams have become more common and more costly—especially for health care organizations. These scams can result in significant financial and reputational loss, especially when an attack leads to a data breach. Digital ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Alert: Coordinated Ransomware Attacks Targeting Hospitals","snippet":"Cyber threats are looming over the health care industry even as the Coronavirus pandemic is resurging. As noted in this Reuters News story, “Eastern European criminals are targeting dozens of U.S. hospitals with ransomware, and federal officials on Wednesday urged healthcare facilities to beef up preparations rapidly in case they are next.”","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=450&height=250&name=Cyber_Threat_Detect.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=225&height=125&name=Cyber_Threat_Detect.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=450&height=250&name=Cyber_Threat_Detect.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=675&height=375&name=Cyber_Threat_Detect.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=900&height=500&name=Cyber_Threat_Detect.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=1125&height=625&name=Cyber_Threat_Detect.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Threat_Detect.gif?width=1350&height=750&name=Cyber_Threat_Detect.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/alert-coordinated-ransomware-attacks-targeting-hospitals?hsLang=en" "> Alert: Coordinated Ransomware Attacks Targeting Hospitals </a> </h3> <span class="resource-card__snippet"> Cyber threats are looming over the health care industry even as the Coronavirus pandemic is resurging. As noted in this Reuters News story, “Eastern European criminals are targeting dozens of U.S. hospitals with ransomware, and federal officials on ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Portfolio Approach, Stronger Controls Stabilize Cyber Market","snippet":"While the cyber market still has its challenges, there are currently greater signs of stability than at any point in the last 24 months. This positive trend has been driven by several key factors, including important lessons learned from what has become a mature, if not less volatile, marketplace.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=450&height=250&name=Cyber%20Market.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=225&height=125&name=Cyber%20Market.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=450&height=250&name=Cyber%20Market.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=675&height=375&name=Cyber%20Market.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=900&height=500&name=Cyber%20Market.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=1125&height=625&name=Cyber%20Market.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Cyber%20Market.jpg?width=1350&height=750&name=Cyber%20Market.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/portfolio-approach-stronger-controls-stabilize-cyber-market?hsLang=en" "> Portfolio Approach, Stronger Controls Stabilize Cyber Market </a> </h3> <span class="resource-card__snippet"> While the cyber market still has its challenges, there are currently greater signs of stability than at any point in the last 24 months. This positive trend has been driven by several key factors, including important lessons learned from what has ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Focus on Systemic Risk Assessment for Increased Cyber Protection","snippet":"With the ever-growing threat of bad cyber actors disrupting critical processes, a systemic risk assessment of potential cyber vulnerabilities is more important than ever. From an insurer's perspective, the benefits of establishing best practices for doing so extend to every activity, from businesses large or small to Private Client concerns.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=450&height=250&name=Cyber_Systemic_Risk_Assessment.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=225&height=125&name=Cyber_Systemic_Risk_Assessment.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=450&height=250&name=Cyber_Systemic_Risk_Assessment.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=675&height=375&name=Cyber_Systemic_Risk_Assessment.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=900&height=500&name=Cyber_Systemic_Risk_Assessment.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=1125&height=625&name=Cyber_Systemic_Risk_Assessment.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Systemic_Risk_Assessment.jpg?width=1350&height=750&name=Cyber_Systemic_Risk_Assessment.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/focus-on-systemic-risk-assessment-for-increased-cyber-protection?hsLang=en" "> Focus on Systemic Risk Assessment for Increased Cyber Protection </a> </h3> <span class="resource-card__snippet"> With the ever-growing threat of bad cyber actors disrupting critical processes, a systemic risk assessment of potential cyber vulnerabilities is more important than ever. From an insurer's perspective, the benefits of establishing best practices for ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Threats and Optimism Grow in the Volatile Cyber Market","snippet":"Cyber insurance has undergone continuous change over the past decade and evolved into one of the most complex and important coverages an organization can have in their toolbox. The cyber insurance market is challenging and volatile, however, with enterprise-wide adoption of proper protocols, an organization can weather the storm.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=450&height=250&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=225&height=125&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=450&height=250&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=675&height=375&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=900&height=500&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=1125&height=625&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Future_of_Risk-Threats_Optimism_in_Cyber_Market.png?width=1350&height=750&name=Future_of_Risk-Threats_Optimism_in_Cyber_Market.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/threats-and-optimism-grow-in-the-volatile-cyber-market-0?hsLang=en" "> Threats and Optimism Grow in the Volatile Cyber Market </a> </h3> <span class="resource-card__snippet"> Cyber insurance has undergone continuous change over the past decade and evolved into one of the most complex and important coverages an organization can have in their toolbox. The cyber insurance market is challenging and volatile, however, with ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"Viewing Cyber Risks Through the Lens of Critical Health Care Infrastructure","snippet":"An awareness of the need to incorporate cyber protection into existing Property &amp; Casualty insurance programs is growing but planning and preparation for the underwriting submission requires a sharp focus to clearly present the risk to the cyber underwriting community.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=450&height=250&name=Health_Care_Cyber_Infrastructure.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=225&height=125&name=Health_Care_Cyber_Infrastructure.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=450&height=250&name=Health_Care_Cyber_Infrastructure.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=675&height=375&name=Health_Care_Cyber_Infrastructure.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=900&height=500&name=Health_Care_Cyber_Infrastructure.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=1125&height=625&name=Health_Care_Cyber_Infrastructure.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Health_Care_Cyber_Infrastructure.gif?width=1350&height=750&name=Health_Care_Cyber_Infrastructure.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/viewing-cyber-risks-through-the-lens-of-critical-health-care-infrastructure?hsLang=en" "> Viewing Cyber Risks Through the Lens of Critical Health Care Infrastructure </a> </h3> <span class="resource-card__snippet"> An awareness of the need to incorporate cyber protection into existing Property & Casualty insurance programs is growing but planning and preparation for the underwriting submission requires a sharp focus to clearly present the risk to the cyber ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cyber Insurance Needs Grow for Public Companies Under New SEC Proposal","snippet":"On March 9, the SEC voted to propose significant new rules that would enhance and standardize public company disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=450&height=250&name=New_SEC_Cyber_rule.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=225&height=125&name=New_SEC_Cyber_rule.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=450&height=250&name=New_SEC_Cyber_rule.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=675&height=375&name=New_SEC_Cyber_rule.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=900&height=500&name=New_SEC_Cyber_rule.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=1125&height=625&name=New_SEC_Cyber_rule.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/New_SEC_Cyber_rule.gif?width=1350&height=750&name=New_SEC_Cyber_rule.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cyber-insurance-needs-grow-for-public-companies-under-new-sec-proposal?hsLang=en" "> Cyber Insurance Needs Grow for Public Companies Under New SEC Proposal </a> </h3> <span class="resource-card__snippet"> On March 9, the SEC voted to propose significant new rules that would enhance and standardize public company disclosures regarding cybersecurity risk management, strategy, governance, and incident reporting. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Architects & Engineers","Cyber"],"name":"Recapturing Opportunity Costs in A&E Cyber Business Interruptions","snippet":"Architecture and engineering firms sit in a uniquely vulnerable position when it comes to business interruption losses. With so much of its intellectual property existing digitally, a firm can suffer extensive losses of time and revenue in the event of a ransomware attack or other cyber breaches.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=450&height=250&name=Architects-Cyber.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=225&height=125&name=Architects-Cyber.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=450&height=250&name=Architects-Cyber.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=675&height=375&name=Architects-Cyber.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=900&height=500&name=Architects-Cyber.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=1125&height=625&name=Architects-Cyber.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Architects-Cyber.gif?width=1350&height=750&name=Architects-Cyber.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/recapturing-opportunity-costs-in-ae-cyber-business-interruptions?hsLang=en" "> Recapturing Opportunity Costs in A&E Cyber Business Interruptions </a> </h3> <span class="resource-card__snippet"> Architecture and engineering firms sit in a uniquely vulnerable position when it comes to business interruption losses. With so much of its intellectual property existing digitally, a firm can suffer extensive losses of time and revenue in the event ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cyber Risk Alert – Guidance for Log4j Exploit","snippet":"The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a known zero day vulnerability in Log4j. Apache Log4j is a logging framework that is embedded in applications which allow developers to log various types of user activity. It is specifically written in the Java programming language and is used in many different types of enterprise systems and web applications.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=450&height=250&name=Log4j2_Exploit.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=225&height=125&name=Log4j2_Exploit.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=450&height=250&name=Log4j2_Exploit.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=675&height=375&name=Log4j2_Exploit.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=900&height=500&name=Log4j2_Exploit.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=1125&height=625&name=Log4j2_Exploit.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Log4j2_Exploit.gif?width=1350&height=750&name=Log4j2_Exploit.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cyber-risk-alert-log4j-exploit-guidance?hsLang=en" "> Cyber Risk Alert – Guidance for Log4j Exploit </a> </h3> <span class="resource-card__snippet"> The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a known zero day vulnerability in Log4j. Apache Log4j is a logging framework that is embedded in applications which allow developers to log ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Increasing Cyber Attacks Lead to Increased Regulations","snippet":"The U.S. government is beefing up regulations and oversight in the fight against cyberattacks. The threats are top of mind for many Americans thanks to an onslaught of high-profile ransomware attacks like the one that hit Colonial Pipeline, sparking panic buying at gas stations up and down the East Coast.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=450&height=250&name=Ransomware_Regs.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=225&height=125&name=Ransomware_Regs.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=450&height=250&name=Ransomware_Regs.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=675&height=375&name=Ransomware_Regs.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=900&height=500&name=Ransomware_Regs.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=1125&height=625&name=Ransomware_Regs.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Ransomware_Regs.gif?width=1350&height=750&name=Ransomware_Regs.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/increasing-cyber-attacks-lead-to-increased-regulations?hsLang=en" "> Increasing Cyber Attacks Lead to Increased Regulations </a> </h3> <span class="resource-card__snippet"> The U.S. government is beefing up regulations and oversight in the fight against cyberattacks. The threats are top of mind for many Americans thanks to an onslaught of high-profile ransomware attacks like the one that hit Colonial Pipeline, sparking ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"Strength in numbers - and better medical malpractice rates","snippet":"Before it became part of Risk Strategies, Danna-Gracey, the agency I co-founded with Julie Danna and Tom Murphy, was Florida’s leading independent medical malpractice insurance specialist. One of the ways we drove the early stages of our growth and leading market position was by engaging our doctors in endorsed programs, as well as one original risk purchasing group (RPG).","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=450&height=250&name=MedMal_RPG.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=225&height=125&name=MedMal_RPG.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=450&height=250&name=MedMal_RPG.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=675&height=375&name=MedMal_RPG.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=900&height=500&name=MedMal_RPG.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=1125&height=625&name=MedMal_RPG.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/MedMal_RPG.gif?width=1350&height=750&name=MedMal_RPG.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/strength-in-numbers-and-better-medical-malpractice-rates?hsLang=en" "> Strength in numbers - and better medical malpractice rates </a> </h3> <span class="resource-card__snippet"> Before it became part of Risk Strategies, Danna-Gracey, the agency I co-founded with Julie Danna and Tom Murphy, was Florida’s leading independent medical malpractice insurance specialist. One of the ways we drove the early stages of our growth and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Addressing the Cybersecurity Vulnerabilities in IoT","snippet":"IoT (Internet of Things) interconnected devices present incredible opportunities for businesses to expand connectivity, automate processes and gather real-time data to which they wouldn’t otherwise have access. On the flip side, these devices present unique challenges to cybersecurity. When these devices fail – or worse, get hacked – they can put an entire organization at risk.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=450&height=250&name=IoT-Security.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=225&height=125&name=IoT-Security.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=450&height=250&name=IoT-Security.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=675&height=375&name=IoT-Security.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=900&height=500&name=IoT-Security.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=1125&height=625&name=IoT-Security.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/IoT-Security.gif?width=1350&height=750&name=IoT-Security.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/addressing-the-cybersecurity-vulnerabilities-in-iot?hsLang=en" "> Addressing the Cybersecurity Vulnerabilities in IoT </a> </h3> <span class="resource-card__snippet"> IoT (Internet of Things) interconnected devices present incredible opportunities for businesses to expand connectivity, automate processes and gather real-time data to which they wouldn’t otherwise have access. On the flip side, these devices ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"FAQ: Kaseya VSA Supply-Chain Ransomware Attack","snippet":"The United States Federal Bureau of Investigations, the Cybersecurity and Infrastructure Security Agency (CISA) and multiple media outlets have reported a supply-chain ransomware attack exploiting a vulnerability in Kaseya VSA software.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=450&height=250&name=Kaysea-FAQ.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=225&height=125&name=Kaysea-FAQ.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=450&height=250&name=Kaysea-FAQ.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=675&height=375&name=Kaysea-FAQ.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=900&height=500&name=Kaysea-FAQ.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=1125&height=625&name=Kaysea-FAQ.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Kaysea-FAQ.gif?width=1350&height=750&name=Kaysea-FAQ.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/faq-kaseya-vsa-supply-chain-ransomware-attack?hsLang=en" "> FAQ: Kaseya VSA Supply-Chain Ransomware Attack </a> </h3> <span class="resource-card__snippet"> The United States Federal Bureau of Investigations, the Cybersecurity and Infrastructure Security Agency (CISA) and multiple media outlets have reported a supply-chain ransomware attack exploiting a vulnerability in Kaseya VSA software. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Colonial Pipeline Breach: Moving the Needle on Ransomware Regulations","snippet":"Another major ransomware attack is altering the U.S. cybersecurity landscape. The Colonial Pipeline ransomware attack resulted in the temporary closure of one of the largest oil pipelines in the country. Even with operations resuming – and a temporary fuel shortage scare over – the incident is far from resolved. The government has announced new cyber security requirements for private business. With cyber insurance policy rates on the rise, these mandates could lead to steep rate spikes in an already hard market.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=450&height=250&name=Colonial_Pipeline_Hack.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=225&height=125&name=Colonial_Pipeline_Hack.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=450&height=250&name=Colonial_Pipeline_Hack.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=675&height=375&name=Colonial_Pipeline_Hack.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=900&height=500&name=Colonial_Pipeline_Hack.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=1125&height=625&name=Colonial_Pipeline_Hack.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Colonial_Pipeline_Hack.gif?width=1350&height=750&name=Colonial_Pipeline_Hack.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/colonial-pipeline-breach-moving-the-needle-on-ransomware-regulations?hsLang=en" "> Colonial Pipeline Breach: Moving the Needle on Ransomware Regulations </a> </h3> <span class="resource-card__snippet"> Another major ransomware attack is altering the U.S. cybersecurity landscape. The Colonial Pipeline ransomware attack resulted in the temporary closure of one of the largest oil pipelines in the country. Even with operations resuming – and a ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Vendor Selection: Best Practices for Risk Management","snippet":"When we talk about third-party vendors, we’re talking about the companies you employ to provide services to you or your customers. They can be incredibly useful and cost-effective resources, but they also present a big risk to those who contract with them. If third-party vendors experience a data breach, it potentially exposes you and your clients, and it will be your responsibility to investigate, respond, and cover the costs of the damage.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=450&height=250&name=Cyber_vendors.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=225&height=125&name=Cyber_vendors.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=450&height=250&name=Cyber_vendors.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=675&height=375&name=Cyber_vendors.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=900&height=500&name=Cyber_vendors.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=1125&height=625&name=Cyber_vendors.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_vendors.png?width=1350&height=750&name=Cyber_vendors.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/vendor-selection-best-practices-for-risk-management?hsLang=en" "> Vendor Selection: Best Practices for Risk Management </a> </h3> <span class="resource-card__snippet"> When we talk about third-party vendors, we’re talking about the companies you employ to provide services to you or your customers. They can be incredibly useful and cost-effective resources, but they also present a big risk to those who contract ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Webinar Recap - Lessons Learned from the Field: Real Life Claims Stories","snippet":"With Robert Rosenzweig, Risk Strategies National Cyber Risk Practice Leader ; Richard Sheridan, Chief Claims Officer at Berkley Cyber Risk Solutions and Steve Krusko, Chief Underwriting Officer at Berkley Cyber Risk Solutions.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=450&height=250&name=Cyber_Webinar_recap.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=225&height=125&name=Cyber_Webinar_recap.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=450&height=250&name=Cyber_Webinar_recap.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=675&height=375&name=Cyber_Webinar_recap.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=900&height=500&name=Cyber_Webinar_recap.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=1125&height=625&name=Cyber_Webinar_recap.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_Webinar_recap.gif?width=1350&height=750&name=Cyber_Webinar_recap.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/webinar-recap-lessons-learned-from-the-field-real-life-claims-stories?hsLang=en" "> Webinar Recap - Lessons Learned from the Field: Real Life Claims Stories </a> </h3> <span class="resource-card__snippet"> With Robert Rosenzweig, Risk Strategies National Cyber Risk Practice Leader ; Richard Sheridan, Chief Claims Officer at Berkley Cyber Risk Solutions and Steve Krusko, Chief Underwriting Officer at Berkley Cyber Risk Solutions. </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cybersecurity and Cloud Solutions","snippet":"The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools, with many businesses choosing to put aside previous concerns about potential security risks to accommodate a remote workforce. However, hasty adoption of any new technology that is not combined with robust security frameworks, policies and controls can leave businesses vulnerable. A formal vendor management process and having specific controls in place can mean the difference between a cloud solution being a huge advantage to agile operations or leaving the business open to attacks and unauthorized access.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=450&height=250&name=Cybersecurity_and_Cloud.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=225&height=125&name=Cybersecurity_and_Cloud.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=450&height=250&name=Cybersecurity_and_Cloud.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=675&height=375&name=Cybersecurity_and_Cloud.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=900&height=500&name=Cybersecurity_and_Cloud.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=1125&height=625&name=Cybersecurity_and_Cloud.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity_and_Cloud.png?width=1350&height=750&name=Cybersecurity_and_Cloud.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cybersecurity-and-cloud-solutions?hsLang=en" "> Cybersecurity and Cloud Solutions </a> </h3> <span class="resource-card__snippet"> The COVID-19 pandemic has led to an acceleration of adoption of cloud solutions and other remote access tools, with many businesses choosing to put aside previous concerns about potential security risks to accommodate a remote workforce. However, ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Consequences of SolarWinds","snippet":"The SolarWinds breach brought a reckoning in the world of cybersecurity, with calls for systemic changes in an industry that has already had to shift dramatically. What makes this cyberattack different from any of the previous ones, and what does it spell for the future of cyber insurance? Read on to find out.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=450&height=250&name=Solarwindsblogimage.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=225&height=125&name=Solarwindsblogimage.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=450&height=250&name=Solarwindsblogimage.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=675&height=375&name=Solarwindsblogimage.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=900&height=500&name=Solarwindsblogimage.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=1125&height=625&name=Solarwindsblogimage.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Solarwindsblogimage.gif?width=1350&height=750&name=Solarwindsblogimage.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-consequences-of-solarwinds?hsLang=en" "> The Consequences of SolarWinds </a> </h3> <span class="resource-card__snippet"> The SolarWinds breach brought a reckoning in the world of cybersecurity, with calls for systemic changes in an industry that has already had to shift dramatically. What makes this cyberattack different from any of the previous ones, and what does it ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Microsoft Exchange Zero-Day Vulnerabilities","snippet":"On March 2, 2021 Microsoft posted an alert advising users that a threat group known as Hafnium had engaged in numerous attacks using a previously unknown vulnerability in on-premises Microsoft Exchange servers. Experts estimate that over 100,000 servers in the United States could be exposed to this vulnerability.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=450&height=250&name=MS_Zero_Day_Exchange.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=225&height=125&name=MS_Zero_Day_Exchange.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=450&height=250&name=MS_Zero_Day_Exchange.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=675&height=375&name=MS_Zero_Day_Exchange.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=900&height=500&name=MS_Zero_Day_Exchange.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=1125&height=625&name=MS_Zero_Day_Exchange.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/MS_Zero_Day_Exchange.gif?width=1350&height=750&name=MS_Zero_Day_Exchange.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/microsoft-exchange-zero-day-vulnerabilities?hsLang=en" "> Microsoft Exchange Zero-Day Vulnerabilities </a> </h3> <span class="resource-card__snippet"> On March 2, 2021 Microsoft posted an alert advising users that a threat group known as Hafnium had engaged in numerous attacks using a previously unknown vulnerability in on-premises Microsoft Exchange servers. Experts estimate that over 100,000 ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"State of the Market 2021: Cyber","snippet":"Following a turbulent year, it is hardly an exaggeration to say that the insurance market is in full blown chaos. Rates are higher, claims are up, and the market continues to harden. As we brace for what promises to be another challenging year, let’s take a closer look at the state of cyber as it stands right now.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=450&height=250&name=Cyber_Market_2021.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=225&height=125&name=Cyber_Market_2021.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=450&height=250&name=Cyber_Market_2021.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=675&height=375&name=Cyber_Market_2021.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=900&height=500&name=Cyber_Market_2021.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=1125&height=625&name=Cyber_Market_2021.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Market_2021.png?width=1350&height=750&name=Cyber_Market_2021.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/state-of-the-market-2021-cyber?hsLang=en" "> State of the Market 2021: Cyber </a> </h3> <span class="resource-card__snippet"> Following a turbulent year, it is hardly an exaggeration to say that the insurance market is in full blown chaos. Rates are higher, claims are up, and the market continues to harden. As we brace for what promises to be another challenging year, ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Industry Outlook: Cyber Insurance & Cybersecurity","snippet":"2020 saw the rise of several key trends in the cybersecurity space, exacerbated by the COVID-19 pandemic and an ever-increasing reliance on technology. As we head into the New Year, let’s look at some of the most pressing issues facing our clients into 2021 and beyond.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=450&height=250&name=Predictions_202021.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=225&height=125&name=Predictions_202021.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=450&height=250&name=Predictions_202021.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=675&height=375&name=Predictions_202021.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=900&height=500&name=Predictions_202021.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=1125&height=625&name=Predictions_202021.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Predictions_202021.gif?width=1350&height=750&name=Predictions_202021.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/industry-outlook-cyber-insurance-cybersecurity?hsLang=en" "> Industry Outlook: Cyber Insurance & Cybersecurity </a> </h3> <span class="resource-card__snippet"> 2020 saw the rise of several key trends in the cybersecurity space, exacerbated by the COVID-19 pandemic and an ever-increasing reliance on technology. As we head into the New Year, let’s look at some of the most pressing issues facing our clients ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"SolarWinds Orion Platform Exploitation Advisory","snippet":"The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a known compromise and ongoing exploitation by malicious attackers of SolarWinds Orion, SolarWinds Orion, a network monitoring and management platform commonly used by outsourced IT managed service providers. We recommend contacting your IT team or provider in order to determine if you use SolarWinds Orion and if steps need to be taken to secure your environment.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=450&height=250&name=SolarWinds_Hack_Alert.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=225&height=125&name=SolarWinds_Hack_Alert.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=450&height=250&name=SolarWinds_Hack_Alert.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=675&height=375&name=SolarWinds_Hack_Alert.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=900&height=500&name=SolarWinds_Hack_Alert.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=1125&height=625&name=SolarWinds_Hack_Alert.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/SolarWinds_Hack_Alert.gif?width=1350&height=750&name=SolarWinds_Hack_Alert.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/solarwinds-orion-platform-exploitation-advisory?hsLang=en" "> SolarWinds Orion Platform Exploitation Advisory </a> </h3> <span class="resource-card__snippet"> The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a known compromise and ongoing exploitation by malicious attackers of SolarWinds Orion, SolarWinds Orion, a network monitoring and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The State of State-Sponsored Attacks","snippet":"The recent advisory issued by the Office of Foreign Assets Control (OFAC) reminded companies to be wary of potential government sanctions when making ransomware payments. There has been an overall increase in state-sponsored attacks during the pandemic, particularly on financial and health care institutions. It makes sense that the OFAC would want companies (and their insurers, who often facilitate payments) to be especially cautious during these times.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=450&height=250&name=Ransomware-2.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=225&height=125&name=Ransomware-2.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=450&height=250&name=Ransomware-2.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=675&height=375&name=Ransomware-2.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=900&height=500&name=Ransomware-2.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=1125&height=625&name=Ransomware-2.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-2.gif?width=1350&height=750&name=Ransomware-2.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-state-of-state-sponsored-attacks?hsLang=en" "> The State of State-Sponsored Attacks </a> </h3> <span class="resource-card__snippet"> The recent advisory issued by the Office of Foreign Assets Control (OFAC) reminded companies to be wary of potential government sanctions when making ransomware payments. There has been an overall increase in state-sponsored attacks during the ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"The Risks Behind the Telemedicine Boom","snippet":"The COVID-19 pandemic has placed enormous strain on health care delivery. As providers have scrambled to deliver patient care while meeting new sanitization and social distancing requirements, telemedicine consequently exploded into popularity as both patients and doctors gladly traded physical visits with virtual ones whenever possible. While, overall, this is a positive advancement for health care, it does come with additional and relatively new risks for providers.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=450&height=250&name=Telemedecine_-_security.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=225&height=125&name=Telemedecine_-_security.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=450&height=250&name=Telemedecine_-_security.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=675&height=375&name=Telemedecine_-_security.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=900&height=500&name=Telemedecine_-_security.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=1125&height=625&name=Telemedecine_-_security.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Telemedecine_-_security.gif?width=1350&height=750&name=Telemedecine_-_security.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-risks-behind-the-telemedicine-boom?hsLang=en" "> The Risks Behind the Telemedicine Boom </a> </h3> <span class="resource-card__snippet"> The COVID-19 pandemic has placed enormous strain on health care delivery. As providers have scrambled to deliver patient care while meeting new sanitization and social distancing requirements, telemedicine consequently exploded into popularity as ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Ransomware Sanctions","snippet":"The Office of Foreign Assets Control (OFAC) has issued an advisory for businesses who may find themselves victims of ransomware attacks. The advisory warns that making payments to cyber criminals could violate anti-money laundering sanctions. It also applies to incident response and insurance companies that help facilitate ransomware payments.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=450&height=250&name=Ransomware-Sanctions.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=225&height=125&name=Ransomware-Sanctions.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=450&height=250&name=Ransomware-Sanctions.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=675&height=375&name=Ransomware-Sanctions.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=900&height=500&name=Ransomware-Sanctions.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=1125&height=625&name=Ransomware-Sanctions.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Ransomware-Sanctions.gif?width=1350&height=750&name=Ransomware-Sanctions.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ransomware-sanctions?hsLang=en" "> Ransomware Sanctions </a> </h3> <span class="resource-card__snippet"> The Office of Foreign Assets Control (OFAC) has issued an advisory for businesses who may find themselves victims of ransomware attacks. The advisory warns that making payments to cyber criminals could violate anti-money laundering sanctions. It ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Growing Ransomware Threat: How to Identify & Remediate Common Vulnerabilities","snippet":"With Robert Rosenzweig, Mike Convertino (Arceo.AI), Bill Hardin (Charles River Associates), and Steve Krusko (Berkley Cyber Risk Solutions)","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=450&height=250&name=RW_webinar.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=225&height=125&name=RW_webinar.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=450&height=250&name=RW_webinar.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=675&height=375&name=RW_webinar.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=900&height=500&name=RW_webinar.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=1125&height=625&name=RW_webinar.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/RW_webinar.jpg?width=1350&height=750&name=RW_webinar.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-growing-ransomware-threat-how-to-identify-remediate-common-vulnerabilities?hsLang=en" "> The Growing Ransomware Threat: How to Identify & Remediate Common Vulnerabilities </a> </h3> <span class="resource-card__snippet"> With Robert Rosenzweig, Mike Convertino (Arceo.AI), Bill Hardin (Charles River Associates), and Steve Krusko (Berkley Cyber Risk Solutions) </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Ripple Effects of a Ransomware Attack","snippet":"Ransomware attacks are on the rise, and the potential business interruption and remediation costs can be astronomical. Companies often find themselves in a bind because there is no guarantee that paying the ransom will result in getting back stolen data, nor will it guarantee protection from future breaches. On the other hand, companies may conclude that paying off the hackers will ultimately be the least costly option.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=450&height=250&name=Cybe_Ripple_1.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=225&height=125&name=Cybe_Ripple_1.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=450&height=250&name=Cybe_Ripple_1.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=675&height=375&name=Cybe_Ripple_1.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=900&height=500&name=Cybe_Ripple_1.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=1125&height=625&name=Cybe_Ripple_1.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybe_Ripple_1.gif?width=1350&height=750&name=Cybe_Ripple_1.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-ripple-effects-of-a-ransomware-attack?hsLang=en" "> The Ripple Effects of a Ransomware Attack </a> </h3> <span class="resource-card__snippet"> Ransomware attacks are on the rise, and the potential business interruption and remediation costs can be astronomical. Companies often find themselves in a bind because there is no guarantee that paying the ransom will result in getting back stolen ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Cybersecurity Exclusions in a Hardening Insurance Market","snippet":"Back in February, when the DOJ announced that the Chinese government was behind two of the largest data security breaches of American companies in history — the Equifax breach of 2017 and the Marriott breach of 2018, it rattled the cyber insurance market.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=450&height=250&name=Cyber_Hack_Attack.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=225&height=125&name=Cyber_Hack_Attack.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=450&height=250&name=Cyber_Hack_Attack.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=675&height=375&name=Cyber_Hack_Attack.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=900&height=500&name=Cyber_Hack_Attack.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=1125&height=625&name=Cyber_Hack_Attack.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_Hack_Attack.gif?width=1350&height=750&name=Cyber_Hack_Attack.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/cybersecurity-exclusions-in-a-hardening-insurance-market?hsLang=en" "> Cybersecurity Exclusions in a Hardening Insurance Market </a> </h3> <span class="resource-card__snippet"> Back in February, when the DOJ announced that the Chinese government was behind two of the largest data security breaches of American companies in history — the Equifax breach of 2017 and the Marriott breach of 2018, it rattled the cyber insurance ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"New Risks for Health Care Providers Amid Coronavirus","snippet":"Hospitals, long-term care, and medical facilities are on the front lines of the pandemic. In addition to the mounting financial losses and personal sacrifices health care workers have had to make, health care organizations face new sets of challenges almost daily.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=450&height=250&name=COVID_Patient_-_Web.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=225&height=125&name=COVID_Patient_-_Web.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=450&height=250&name=COVID_Patient_-_Web.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=675&height=375&name=COVID_Patient_-_Web.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=900&height=500&name=COVID_Patient_-_Web.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=1125&height=625&name=COVID_Patient_-_Web.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/COVID_Patient_-_Web.png?width=1350&height=750&name=COVID_Patient_-_Web.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/new-risks-for-health-care-providers-amid-coronavirus?hsLang=en" "> New Risks for Health Care Providers Amid Coronavirus </a> </h3> <span class="resource-card__snippet"> Hospitals, long-term care, and medical facilities are on the front lines of the pandemic. In addition to the mounting financial losses and personal sacrifices health care workers have had to make, health care organizations face new sets of ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Securing the Remote Workforce in the Wake of the COVID-19 Global Health Crisis","snippet":"As anticipated at the onset of the COVID-19 pandemic the industry has seen a significant uptick in cyber fraud in the last month and a half. The FBI recently cited an average number of 3,000 to 4,000 daily complaints about online scams compared to approximately 1,000 prior to COVID-19.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=450&height=250&name=Corona_Virus_molecule-min.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=225&height=125&name=Corona_Virus_molecule-min.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=450&height=250&name=Corona_Virus_molecule-min.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=675&height=375&name=Corona_Virus_molecule-min.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=900&height=500&name=Corona_Virus_molecule-min.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=1125&height=625&name=Corona_Virus_molecule-min.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Corona_Virus_molecule-min.jpg?width=1350&height=750&name=Corona_Virus_molecule-min.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/securing-the-remote-workforce-in-the-wake-of-the-covid-19-global-health-crisis?hsLang=en" "> Securing the Remote Workforce in the Wake of the COVID-19 Global Health Crisis </a> </h3> <span class="resource-card__snippet"> As anticipated at the onset of the COVID-19 pandemic the industry has seen a significant uptick in cyber fraud in the last month and a half. The FBI recently cited an average number of 3,000 to 4,000 daily complaints about online scams compared to ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Ransomware on the Rise, Changes in Cyber Market on the Horizon","snippet":"For the last couple of years, ransomware attacks — in which cyber criminals gain access to a computer system, encrypt the data and demand a ransom to restore it — have been on the rise, with a significant acceleration of incidents in the last few months. In fact, a recent Malwarebytes Labs report found a 195% increase in business detections of ransomware from the Q4 of 2018 to Q1 of 2019 (and a 500% uptick from the same time last year).","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=450&height=250&name=cyber-body1-1.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=225&height=125&name=cyber-body1-1.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=450&height=250&name=cyber-body1-1.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=675&height=375&name=cyber-body1-1.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=900&height=500&name=cyber-body1-1.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=1125&height=625&name=cyber-body1-1.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber-body1-1.jpg?width=1350&height=750&name=cyber-body1-1.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ransomware-on-the-rise-changes-in-cyber-market-on-the-horizon?hsLang=en" "> Ransomware on the Rise, Changes in Cyber Market on the Horizon </a> </h3> <span class="resource-card__snippet"> For the last couple of years, ransomware attacks — in which cyber criminals gain access to a computer system, encrypt the data and demand a ransom to restore it — have been on the rise, with a significant acceleration of incidents in the last few ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Ransomware & Business Email Compromise Webinar","snippet":"On Wednesday, April 17th Risk Strategies, in partnership with cyber security experts The Crypsis Group, hosted a webinar looking at Ransomware &amp; Business Email Compromise. We were joined on the webinar by Chris Salsberry, a Senior Director at Crypsis, who has over 20 years of digital and forensic investigative experience. There were a few main takeaways from the webinar:","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=225&height=125&name=Cyber_-_Networked_Biz.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=675&height=375&name=Cyber_-_Networked_Biz.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=900&height=500&name=Cyber_-_Networked_Biz.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=1125&height=625&name=Cyber_-_Networked_Biz.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=1350&height=750&name=Cyber_-_Networked_Biz.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ransomware-business-email-compromise-webinar?hsLang=en" "> Ransomware & Business Email Compromise Webinar </a> </h3> <span class="resource-card__snippet"> On Wednesday, April 17th Risk Strategies, in partnership with cyber security experts The Crypsis Group, hosted a webinar looking at Ransomware & Business Email Compromise. We were joined on the webinar by Chris Salsberry, a Senior Director at ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"The Internet of Insecure Things is Changing Risk Profiles","snippet":"We’re rapidly entering the Internet of Things (IOT) era; more and more connected devices are coming online every day, from consumer appliances to medical devices to self-driving cars. This exponential growth brings with it greater vulnerability due to an ever expanding attack surface.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=450&height=250&name=Cybersecurity-Networked.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=225&height=125&name=Cybersecurity-Networked.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=450&height=250&name=Cybersecurity-Networked.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=675&height=375&name=Cybersecurity-Networked.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=900&height=500&name=Cybersecurity-Networked.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=1125&height=625&name=Cybersecurity-Networked.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cybersecurity-Networked.png?width=1350&height=750&name=Cybersecurity-Networked.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-internet-of-insecure-things-is-changing-risk-profiles?hsLang=en" "> The Internet of Insecure Things is Changing Risk Profiles </a> </h3> <span class="resource-card__snippet"> We’re rapidly entering the Internet of Things (IOT) era; more and more connected devices are coming online every day, from consumer appliances to medical devices to self-driving cars. This exponential growth brings with it greater vulnerability due ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Expect More Class Action Lawsuits after CCPA","snippet":"In terms of data privacy regulation, 2018 was a ground-breaking year. On May 25, GDPR, the EU’s most stringent regulation on data privacy in 20 years, went into effect, imposing fines of up to €20 million or 4 percent of a company’s worldwide revenue for non-compliance. Less than a month later, California passed the strictest data privacy law in the United States with its California Consumer Privacy Act (CCPA).","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=225&height=125&name=PRM_NEWS1_450x300.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=675&height=375&name=PRM_NEWS1_450x300.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=900&height=500&name=PRM_NEWS1_450x300.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1125&height=625&name=PRM_NEWS1_450x300.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1350&height=750&name=PRM_NEWS1_450x300.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/expect-more-class-action-lawsuits-after-ccpa?hsLang=en" "> Expect More Class Action Lawsuits after CCPA </a> </h3> <span class="resource-card__snippet"> In terms of data privacy regulation, 2018 was a ground-breaking year. On May 25, GDPR, the EU’s most stringent regulation on data privacy in 20 years, went into effect, imposing fines of up to €20 million or 4 percent of a company’s worldwide ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"How Cyber Threats Could Impact Your Courier Business","snippet":"if you're a courier (or really any business) owner, this is an important question to ask, and even more important that you find the answer...","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=450&height=250&name=272-article-img-1.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=225&height=125&name=272-article-img-1.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=450&height=250&name=272-article-img-1.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=675&height=375&name=272-article-img-1.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=900&height=500&name=272-article-img-1.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=1125&height=625&name=272-article-img-1.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=1350&height=750&name=272-article-img-1.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/how-cyber-threats-could-impact-your-courier-business?hsLang=en" "> How Cyber Threats Could Impact Your Courier Business </a> </h3> <span class="resource-card__snippet"> if you're a courier (or really any business) owner, this is an important question to ask, and even more important that you find the answer... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Hackers get the headlines, but social engineers get the data","snippet":"Not a day goes by without a data breach of some type making headlines. Most of those headlines are covering breaches perpetrated by so-called black hat hackers exploiting a technical vulnerability. While far less exciting, the vast majority of incidents exploit human vulnerabilities by crafting extremely targeted so-called social engineering emails to induce recipients to offer up their account credentials.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=450&height=250&name=Cloud_Phishing.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=225&height=125&name=Cloud_Phishing.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=450&height=250&name=Cloud_Phishing.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=675&height=375&name=Cloud_Phishing.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=900&height=500&name=Cloud_Phishing.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=1125&height=625&name=Cloud_Phishing.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cloud_Phishing.png?width=1350&height=750&name=Cloud_Phishing.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/hackers-get-the-headlines-but-social-engineers-get-the-data?hsLang=en" "> Hackers get the headlines, but social engineers get the data </a> </h3> <span class="resource-card__snippet"> Not a day goes by without a data breach of some type making headlines. Most of those headlines are covering breaches perpetrated by so-called black hat hackers exploiting a technical vulnerability. While far less exciting, the vast majority of ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Rising Tide of Privacy Regulation","snippet":"Call it the GDPR effect. Since May, when the European Union’s General Data Protection Regulation (GDPR) – the most sweeping legislation in history for data privacy protection – went into effect, there’s been a growing trend in the United States to shore up laws protecting consumer privacy rights. As an early adopter of everything from supermarket sushi to electric cars, it’s no surprise that California is the first state to pass laws modeled after the EU’s stringent privacy law. In the months since GDPR, California has passed two significant pieces of legislation: California Consumer Privacy Act of 2018 (CCPA) IoT Cybersecurity Improvement Act of 2017 Of the two laws, CCPA has the greatest potential impact on businesses. Structured in much the same way as GDPR, CCPA places restrictions on how companies collect, store and distribute data, and how they notify individuals of breaches. And much like GDPR, the stick is bigger than the carrot. There are significant penalties for non-compliance. Briefly, the main tenets of CCPA include: Right to Opt Out. Consumers have the right to opt out of the sale of their personal information and businesses must publish their privacy policies on their home page. Right to Access. The law defines “personal information” and gives consumers the right to request which personal information a business has collected. Right to Delete. Consumers have the right to request the deletion of their personal information. Right to Opt In. For children under 16-years-old, businesses must have opt-in consent to sell their personal information. For children under 13-years-old, that opt-in consent must come from a parent or guardian. Penalties for Non-Compliance. Fines up to $750 per incident can be imposed; a data breach involving 10,000 customers could equate to a $7.5 million fine. Additionally, civil penalties can be up to $7,500 per intentional violation. What does CCPA mean for you? The world is increasingly smaller with the onset of a digital economy. A lot of businesses that thought they wouldn’t be regulated by GDPR are going to be impacted by CCPA. Similar to GDPR, which extends to any organization doing business with EU citizens, even if it’s located outside of EU borders, CCPA applies to any businesses operating in California. And although it’s not as expansive as GDPR (for example, GDPR requires companies to appoint a Data Protection Officer in some cases), CCPA may have more impact in the U.S. because, for the first time, smaller businesses are now facing increased data privacy regulatory scrutiny. Leading up to GDPR and during the implementation to become compliant, there was a general sense that regulators would only go after the Facebooks of the world, to make an example out of big data players. But with CCPA, it’s more likely that small and mid-sized organizations will be impacted. How the new regulation will really impact the data privacy and security ecosystem is yet to be determined. It will all come down to what kind of teeth CCPA will have when the law goes into effect in January 2020. Regardless, it is clear that a more stringent data privacy regulatory landscape is here to stay. CCPA is the most restrictive non-industry specific regulatory framework in the U.S., but it won’t be the last. California is traditionally first to adopt progressive legislation, but states like New York and Massachusetts are sure to follow suit. Even if your company doesn’t currently have transactions in California or with EU citizens, now is the time to start looking at your data privacy policies more closely. To get in touch with one of our cyber liability specialists, contact rrosenzweig@risk-strategies.com.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=225&height=125&name=PRM_NEWS1_450x300.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=675&height=375&name=PRM_NEWS1_450x300.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=900&height=500&name=PRM_NEWS1_450x300.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1125&height=625&name=PRM_NEWS1_450x300.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1350&height=750&name=PRM_NEWS1_450x300.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/rising-tide-of-privacy-regulation?hsLang=en" "> Rising Tide of Privacy Regulation </a> </h3> <span class="resource-card__snippet"> Call it the GDPR effect. Since May, when the European Union’s General Data Protection Regulation (GDPR) – the most sweeping legislation in history for data privacy protection – went into effect, there’s been a growing trend in the United States to ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber","Healthcare"],"name":"The internet of (insecure) things - a looming risk in health care?","snippet":"Technology industry research and advisory firm Gartner estimates that there will be 20.4 billion connected Internet of Things devices (IoT) by 2020. Given the growth potential in this marketplace, these products are often rushed to market and the built in security is often deficient relative to legacy systems. So, while these devices bring many conveniences to consumers and allow commercial users to realize efficiencies and innovate, it is important to remember that the increase in the the use of these devices also increases the number of points of vulnerability – what cyber security experts call the attack surface - for households and corporations.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=450&height=250&name=Hospital_IoT_-_Cyber.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=225&height=125&name=Hospital_IoT_-_Cyber.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=450&height=250&name=Hospital_IoT_-_Cyber.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=675&height=375&name=Hospital_IoT_-_Cyber.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=900&height=500&name=Hospital_IoT_-_Cyber.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=1125&height=625&name=Hospital_IoT_-_Cyber.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Hospital_IoT_-_Cyber.png?width=1350&height=750&name=Hospital_IoT_-_Cyber.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/the-internet-of-insecure-things-a-looming-risk-in-health-care?hsLang=en" "> The internet of (insecure) things - a looming risk in health care? </a> </h3> <span class="resource-card__snippet"> Technology industry research and advisory firm Gartner estimates that there will be 20.4 billion connected Internet of Things devices (IoT) by 2020. Given the growth potential in this marketplace, these products are often rushed to market and the ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Trends in Ransomware","snippet":"At some point, any business could be faced with a malicious ransomware attack. As cyber criminals grow more sophisticated, ransomware attacks are becoming more destructive year after year, and the cost to companies in remediation, lost revenues, business interruption and reputation is steadily on the incline. Some trends have started to emerge in the past year. Ransomware is on the rise. By far and away, ransomware is the fastest growing attack pattern we’re seeing. In fact, 2017 could be called the year of the mega ransomware attack. WannaCry, which essentially crippled the U.K.’s National Health Service computer systems, forcing hospital closures and cancellations of critical appointments and surgeries, was the beginning of the ransomware tidal wave. A month later, NotPetya became the most destructive global ransomware attack to date, costing over two billion dollars in a single quarter in business interruption to companies across Europe. Originating in the Ukraine, the attackers targeted companies including Maersk Lines, Merck &amp; Co., DHL, FedEx and multinational law firm DLA Piper, to name a few. The shipping line Maersk alone estimated between $200 and $300 million in lost revenues during the attack. Had the same ransomware hit systems in the U.S., the cost would have been significantly higher. But it’s not just large, multinational corporations that are feeling the impact of ransomware attacks. Enterprises across all industries, geographies and sizes are being targeted. Higher demands. Another trend we’re seeing in ransomware is that extortion fees are going up. A couple years ago, ransoms were routinely in the thousands of dollars range. Today, those demands are generally running into the six- and high-seven-figures, to be paid in bitcoin and other digital currencies. Whether or not a company should pay the extortion fee depends on how good their controls are prior to the attack. If a company has a robust daily back-up to restore their system, and the cost of remediation is less than the ransom demands, then there’s no reason to pay. Additionally, there’s no guarantee of honor amongst thieves in cybercrime. In other words, even if you pay the extortion fee, your data will not necessarily be restored uncorrupted. It’s important to hire experienced vendors who investigate ransomware incidents. They will most likely be able to recognize whether it’s a legitimate claim, or if paying the ransom only marks you as an easy target for future attacks. More destructive malware. As cybercriminals fine-tune their skills, the malware they’re creating is growing increasingly destructive in nature. Older forms of malware operated by simply locking companies out of their data. If a company didn’t pay the ransom, then it risked losing the data forever. Today’s malware has taken destruction to a whole new level, infecting not only a company’s data, but the hardware on the systems themselves. For example, when the international law firm DLA Piper was hit in the NotPetya attack, it wasn’t just the firm’s digital data that was compromised – their hardware was corrupted as well. Piper attorneys all over the world were told to unplug their devices, phones and laptops while the company bought new ones. Fortunately, another trend has emerged. That is, cyber insurance is becoming more affordable and accessible than ever before. Media attention to cyber events in the last year has helped drive market demand of cyber insurance. Recent laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act of 2018, have shined a light on data breaches in which personally identifiable information has been compromised. And while much of the media focus has been on data privacy and consumer protection, state and federal compliance laws that govern the reporting and remediation of data breaches have helped create more transparency. As a result, the demand for cyber insurance has grown. Today, even if you’re a smaller company, cyber insurance is affordable, accessible and covers more damages related to cyberattacks than ever before. Insurance products are available to cover the costs of business interruption, remediation, and even the expense of replacing hardware. For more information on how to protect your business against cyberattacks, contact rrosenzweig@risk-strategies.com.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=225&height=125&name=Cyber_-_Networked_Biz.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=675&height=375&name=Cyber_-_Networked_Biz.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=900&height=500&name=Cyber_-_Networked_Biz.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=1125&height=625&name=Cyber_-_Networked_Biz.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/Cyber_-_Networked_Biz.png?width=1350&height=750&name=Cyber_-_Networked_Biz.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/trends-in-ransomware?hsLang=en" "> Trends in Ransomware </a> </h3> <span class="resource-card__snippet"> At some point, any business could be faced with a malicious ransomware attack. As cyber criminals grow more sophisticated, ransomware attacks are becoming more destructive year after year, and the cost to companies in remediation, lost revenues, ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Weak Virtual Links and Your Business","snippet":"You’re only as strong as your weakest link – and in today’s networked business world that weak link could be anywhere. Another unfortunate reminder of this surfaced recently as a Canadian supplier to major automakers was breached and important data on those clients stolen.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=225&height=125&name=Cyber_-_Networked_Biz.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=450&height=250&name=Cyber_-_Networked_Biz.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=675&height=375&name=Cyber_-_Networked_Biz.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=900&height=500&name=Cyber_-_Networked_Biz.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=1125&height=625&name=Cyber_-_Networked_Biz.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cyber_-_Networked_Biz.png?width=1350&height=750&name=Cyber_-_Networked_Biz.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/weak-virtual-links-and-your-business?hsLang=en" "> Weak Virtual Links and Your Business </a> </h3> <span class="resource-card__snippet"> You’re only as strong as your weakest link – and in today’s networked business world that weak link could be anywhere. Another unfortunate reminder of this surfaced recently as a Canadian supplier to major automakers was breached and important data ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Private Equity","Cyber"],"name":"Think You’re Safe from Cyber Risk? Think Again","snippet":"When a private equity firm acquires a company, whether it’s a billion-dollar tech company or a mid-sized pizza franchise, the buyer may be taking on more than the seller’s assets; they may also be taking on relevant exposure associated with those assets. One of the most malicious risks we’ve seen in recent years in M&amp;A transactions is cyber liability, and, surprisingly, it’s often overlooked.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=450&height=250&name=Cybersecurity-Networked.png" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=225&height=125&name=Cybersecurity-Networked.png 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=450&height=250&name=Cybersecurity-Networked.png 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=675&height=375&name=Cybersecurity-Networked.png 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=900&height=500&name=Cybersecurity-Networked.png 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=1125&height=625&name=Cybersecurity-Networked.png 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/Cybersecurity-Networked.png?width=1350&height=750&name=Cybersecurity-Networked.png 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/think-youre-safe-from-cyber-risk-think-again?hsLang=en" "> Think You’re Safe from Cyber Risk? Think Again </a> </h3> <span class="resource-card__snippet"> When a private equity firm acquires a company, whether it’s a billion-dollar tech company or a mid-sized pizza franchise, the buyer may be taking on more than the seller’s assets; they may also be taking on relevant exposure associated with those ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Ransomware – Payment is only the first cost","snippet":"So far this year, ransomware attacks have topped the list of cyber-incidents plaguing organizations. In these attacks, hackers break into systems and encrypt all data, effectively preventing access without a special code key. Getting that key, and your data back, is where the ransom comes in.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=450&height=250&name=272-article-img-1.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=225&height=125&name=272-article-img-1.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=450&height=250&name=272-article-img-1.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=675&height=375&name=272-article-img-1.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=900&height=500&name=272-article-img-1.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=1125&height=625&name=272-article-img-1.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img-1.jpg?width=1350&height=750&name=272-article-img-1.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/ransomware-payment-is-only-the-first-cost?hsLang=en" "> Ransomware – Payment is only the first cost </a> </h3> <span class="resource-card__snippet"> So far this year, ransomware attacks have topped the list of cyber-incidents plaguing organizations. In these attacks, hackers break into systems and encrypt all data, effectively preventing access without a special code key. Getting that key, and ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Private Client","Cyber"],"name":"Social Engineering: Why It’s The Biggest Threat to Your Personal Assets & Security","snippet":"","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=450&height=250&name=cyber.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=225&height=125&name=cyber.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=450&height=250&name=cyber.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=675&height=375&name=cyber.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=900&height=500&name=cyber.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=1125&height=625&name=cyber.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/cyber.jpg?width=1350&height=750&name=cyber.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/social-engineering-why-its-the-biggest-threat-to-your-personal-assets-security?hsLang=en" "> Social Engineering: Why It’s The Biggest Threat to Your Personal Assets & Security </a> </h3> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Listen up – You might have a Silent Cyber Risk problem","snippet":"Silent Cyber Risk is a new, emerging term that most outside of the insurance industry have never heard. What is Silent Cyber Risk and why is it gaining so much buzz in the insurance industry? In short it’s a term that speaks to the complex chain of liability that cyber threats can entail. Your approach to Cyber Liability may not be ready.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=450&height=250&name=cyber-liability-hero.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=225&height=125&name=cyber-liability-hero.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=450&height=250&name=cyber-liability-hero.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=675&height=375&name=cyber-liability-hero.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=900&height=500&name=cyber-liability-hero.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=1125&height=625&name=cyber-liability-hero.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported_Blog_Media/cyber-liability-hero.jpg?width=1350&height=750&name=cyber-liability-hero.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/listen-up-you-might-have-a-silent-cyber-risk-problem?hsLang=en" "> Listen up – You might have a Silent Cyber Risk problem </a> </h3> <span class="resource-card__snippet"> Silent Cyber Risk is a new, emerging term that most outside of the insurance industry have never heard. What is Silent Cyber Risk and why is it gaining so much buzz in the insurance industry? In short it’s a term that speaks to the complex chain of ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Should Your Business Be Preparing for GDPR? (Spoiler Alert: Yes)","snippet":"Since I first put pen to paper on this blog just last week, three more major hacks have hit the headlines – The Hudson’s Bay Company, Orbitz and Under Armour Already in 2018, we have seen several high-profile security breaches. Bad news for sure, though the good news is that change is in the works. Beginning in May, the European Union’s General Data Protection Regulation (GDPR) will officially go into effect. GDPR will require businesses to protect the personal data and privacy of citizens in the EU for transactions that occur within EU member states. For example, companies will need the same level of protection for an individual’s IP address as they do for name, address and Social Security number. At a high-level, the implementation of GDPR means that any U.S.-based business collecting data on citizens in the EU will be held to these higher standards of security and are vulnerable to new, costly sanctions for non-compliance. As such, it is imperative to ensure that insurance policies are structured appropriately to provide coverage for legal fees, fines and penalties. Any businesses that will be affected by the changes should get in touch with their broker as soon as possible to tackle any policy nuances GDPR may bring. For instance, as it stands today, some carriers only provide coverage for regulatory inquiries when a business has had a data security incident. Under GDPR, regulators are likely to conduct proactive investigations – before a breach happens. If they were to find any deficiencies or areas of non-compliance in the system, you’d potentially be left exposed for those costs. An important consideration right now for any small, medium or large business – regardless of whether it needs to comply with GDPR – is employee training. Time and time again the biggest vulnerability are people, not the technology. Work with your risk manager to put together drills and an incident response plan. Neither you nor your bottom line will be sorry. To get your business prepared for GDPR, reach out today: cyber@risk-strategies.com.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=225&height=125&name=PRM_NEWS1_450x300.gif 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=450&height=250&name=PRM_NEWS1_450x300.gif 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=675&height=375&name=PRM_NEWS1_450x300.gif 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=900&height=500&name=PRM_NEWS1_450x300.gif 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1125&height=625&name=PRM_NEWS1_450x300.gif 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/PRM_NEWS1_450x300.gif?width=1350&height=750&name=PRM_NEWS1_450x300.gif 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/should-your-business-be-preparing-for-gdpr-spoiler-alert-yes?hsLang=en" "> Should Your Business Be Preparing for GDPR? (Spoiler Alert: Yes) </a> </h3> <span class="resource-card__snippet"> Since I first put pen to paper on this blog just last week, three more major hacks have hit the headlines – The Hudson’s Bay Company, Orbitz and Under Armour Already in 2018, we have seen several high-profile security breaches. Bad news for sure, ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> <div class="resources__column" data-is-active="true" data-column-properties="{"industry":["Cyber"],"name":"Tips for How Small Businesses Can Respond to Data Risk Privacy Risk Management","snippet":"According to a Business Insurance poll of business owners and risk managers, cyber security and data privacy have taken the lead as the most concerning business risk, over natural disasters, corporate liability, and changing legislation or regulation.","type":"Blog Post"}"> <div class="resource-card resource-card--standard-small on-light resource-card--is-linked"> <div class="resource-card__image"> <picture class="module__picture"> <img class="module__picture-element" src="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=450&height=250&name=272-article-img.jpg" alt="" loading="lazy" width="450" height="250" srcset="https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=225&height=125&name=272-article-img.jpg 225w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=450&height=250&name=272-article-img.jpg 450w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=675&height=375&name=272-article-img.jpg 675w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=900&height=500&name=272-article-img.jpg 900w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=1125&height=625&name=272-article-img.jpg 1125w, https://www.risk-strategies.com/hs-fs/hubfs/Imported%20sitepage%20images/272-article-img.jpg?width=1350&height=750&name=272-article-img.jpg 1350w" sizes="(max-width: 450px) 100vw, 450px"> </picture> </div> <div class="resource-card__inner" aria-hidden="true"> <div class="resource-card__content"> <div class="resource-card__content-top"> <div class="resource-card__byline"> <span class="resource-card__type"> <span class="tag"> Cyber </span> </span> <span class="resource-card__read-time"> 2 min read </span> </div> <h3 class="resource-card__title"> <a href="https://www.risk-strategies.com/blog/tips-for-how-small-businesses-can-respond-to-data-risk-privacy-risk-management?hsLang=en" "> Tips for How Small Businesses Can Respond to Data Risk Privacy Risk Management </a> </h3> <span class="resource-card__snippet"> According to a Business Insurance poll of business owners and risk managers, cyber security and data privacy have taken the lead as the most concerning business risk, over natural disasters, corporate liability, and changing legislation or ... </span> </div> <div class="resource-card__bottom"> </div> </div> </div> </div> </div> </div> <div class="resources__empty"> <div class="resources__empty-content"><h3>Sorry!</h3><p>No items currently match your filtering criteria.</p></div> <div class="resources__empty-actions"> <button type="button" class="resources__reset cta-btn"> <span class="resources__reset-inner">Reset Filters</span> </button> </div> </div> </div> </div> </div> </div> </div> </div> </div> <div id="hs_cos_wrapper_widget_81147747693" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <div class="cta-bar module module--padding-top-medium module--padding-bottom-medium on-dark module--bg-secondary"> <div class="module__inner constrain"> <div class="module__section-main module__section-main--block-align-left"> <div class="module__content module__content--text-align-left constrain--12"> <div class="cta-bar__content-inner"> <div class="cta-bar__content"> <div class="cta-bar__grid"> <div class="cta-bar__grid-column"> <h2>Partner with us.</h2> </div> <div class="cta-bar__grid-column"> <p><!--HubSpot Call-to-Action Code --><span class="hs-cta-wrapper" id="hs-cta-wrapper-fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62"><span class="hs-cta-node hs-cta-fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62" id="hs-cta-fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62"><!--[if lte IE 8]><div id="hs-cta-ie-element"></div><![endif]--><a href="https://cta-redirect.hubspot.com/cta/redirect/20256628/fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62"><img class="hs-cta-img" id="hs-cta-img-fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62" style="border-width:0px;" src="https://no-cache.hubspot.com/cta/default/20256628/fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62.png" alt="Let's Talk"></a></span><script charset="utf-8" src="/hs/cta/cta/current.js"></script><script type="text/javascript"> hbspt.cta._relativeUrls=true;hbspt.cta.load(20256628, 'fa4e3637-d1dc-4a39-a6d4-042a5ae8cb62', {"useNewLoader":"true","region":"na1"}); </script></span><!-- end HubSpot Call-to-Action Code --></p> </div> </div> </div> </div> </div> </div> </div> </div> </div></span> </div> </main> <div id="hs_cos_wrapper_module_site_footer" class="hs_cos_wrapper hs_cos_wrapper_widget hs_cos_wrapper_type_module" style="" data-hs-cos-general-type="widget" data-hs-cos-type="module"> <footer class="site-footer"> <div class="site-footer__top"> <div class="site-footer__top-inner"> <div class="site-footer__top-left"> <div class="site-footer__logo"> <img src="https://www.risk-strategies.com/hubfs/assets/images/logos/logo-on-dark.svg" alt="Risk Strategies Logo" width="106" height="50"> </div> </div> <div class="site-footer__top-right"> <div class="site-footer__main-menu"> <div id="hs_menu_wrapper_module_site_footer_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="MJTW Footer Menu" data-menu-id="81107664215" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/report-claim" role="menuitem">Report a Claim</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/clients" role="menuitem">Clients</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/contact-us/" role="menuitem">Contact</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/employee-portal" role="menuitem">Employees</a></li> </ul> </div> </div> <div class="site-footer__legal-menu"> <div id="hs_menu_wrapper_module_site_footer_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="MJTW Footer Legal Menu" data-menu-id="81113735584" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/terms-and-conditions" role="menuitem">Terms of Use</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/cookie-policy" role="menuitem">Cookie Policy </a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/privacy-policy" role="menuitem">Privacy Policy</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/washington-and-nevada-consumer-health-data-privacy-notice" role="menuitem">Consumer Health Data Privacy Notice</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/accessibility" role="menuitem">Accessibility</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/health-plan-transparency-compliance" role="menuitem">Health Plan Transparency Compliance</a></li> </ul> </div> </div> <div class="site-footer__legal-menu site-footer__legal-menu--lp" style="display: none;"> <div id="hs_menu_wrapper_module_site_footer_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="Footer" data-menu-id="78716221880" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/accessibility" role="menuitem">Accessibility</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/cookie-policy" role="menuitem">Cookie Policy</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/health-plan-transparency-compliance" role="menuitem">Health Plan Transparency Disclosure</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/privacy-policy" role="menuitem">Privacy Policy</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.risk-strategies.com/terms-and-conditions" role="menuitem">Terms of Use</a></li> </ul> </div> </div> </div> </div> </div> <div class="site-footer__inner"> <div class="site-footer__bottom"> <div class="site-footer__bottom-left"> <div class="site-footer__copyright"> <span class="site-footer__copyright-text">©2024 Risk Strategies. All rights reserved.</span> </div> </div> <div class="site-footer__bottom-right"> <div class="site-footer__social-links"> <h3 class="h6">Connect with Us</h3> <div id="hs_menu_wrapper_module_site_footer_" class="hs-menu-wrapper active-branch no-flyouts hs-menu-flow-horizontal" role="navigation" data-sitemap-name="MJTW Footer Social Links" data-menu-id="91790871907" aria-label="Navigation Menu"> <ul role="menu"> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.linkedin.com/company/risk-strategies-company/" role="menuitem" target="_blank" rel="noopener">LinkedIn</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://twitter.com/RiskStrategies" role="menuitem" target="_blank" rel="noopener">Twitter</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.instagram.com/riskstrategiescompany" role="menuitem" target="_blank" rel="noopener">Instagram</a></li> <li class="hs-menu-item hs-menu-depth-1" role="none"><a href="https://www.facebook.com/RiskStrategiesCompany/" role="menuitem" target="_blank" rel="noopener">Facebook</a></li> </ul> </div> </div> </div> </div> </div> </footer></div> </div> </div> <!-- HubSpot performance collection script --> <script defer src="/hs/hsstatic/content-cwv-embed/static-1.1293/embed.js"></script> <script src="https://www.risk-strategies.com/hs-fs/hub/20256628/hub_generated/template_assets/81097728599/1727870421215/mjtw/js/mjtw_main.min.js"></script> <script> var hsVars = hsVars || {}; hsVars['language'] = 'en'; </script> <script src="/hs/hsstatic/cos-i18n/static-1.53/bundles/project.js"></script> <!-- Start of HubSpot Analytics Code --> <script type="text/javascript"> var _hsq = _hsq || []; _hsq.push(["setContentType", "standard-page"]); _hsq.push(["setCanonicalUrl", "https:\/\/www.risk-strategies.com\/insights\/emergency-resource-center\/cybersecurity"]); _hsq.push(["setPageId", "86069678848"]); _hsq.push(["setContentMetadata", { "contentPageId": 86069678848, "legacyPageId": "86069678848", "contentFolderId": null, "contentGroupId": null, "abTestId": null, "languageVariantId": 86069678848, "languageCode": "en", }]); </script> <script type="text/javascript" id="hs-script-loader" async defer src="/hs/scriptloader/20256628.js?businessUnitId=0"></script> <!-- End of HubSpot Analytics Code --> <script type="text/javascript"> var hsVars = { render_id: "4555808b-fac4-4283-9659-d65d93fb6e2d", ticks: 1732288426723, page_id: 86069678848, content_group_id: 0, portal_id: 20256628, app_hs_base_url: "https://app.hubspot.com", cp_hs_base_url: "https://cp.hubspot.com", language: "en", analytics_page_type: "standard-page", scp_content_type: "", analytics_page_id: "86069678848", category_id: 1, folder_id: 0, is_hubspot_user: false } </script> <script defer src="/hs/hsstatic/HubspotToolsMenu/static-1.354/js/index.js"></script> </body></html>