Category Archives: Cyber Risk

The cyber risk of tax return fraud: what you should know

There are many opportunities for fraud during the creation, delivery and usage of tax documents during tax filing season. Continue reading →

Privacy mindfulness in the “Internet of Everything” age

Personal information is being exposed in more places, through more “things” and to more people every day, creating new risks for people, businesses, health care organizations, governments and society as a whole. Continue reading →

What risks will emerge in 2017?

A look at the emerging risks for 2017 reveals two clear touchpoints: people and politics – and especially politics. Risk experts in areas ranging from human capital to transportation, from Washington, DC to Brazil are looking at the broad implications … Continue reading →

Blockchain – How far can business process automation go?

Although Bitcoin is now 8 years old, the current driver of interest in blockchain is the ability to reduce logistical costs, prevent fraud and eliminate legal disputes. Continue reading →

2017’s most dangerous risks for insurers

We took a list of over 50 risks commonly found on insurer risk registers, and asked, “Which risks present the most danger to your firm in 2017?" Continue reading →

Wearable tech: Consumer toy or business tool?

From fashion designers to tech players like Google and Snap, companies are exploring opportunities in the wearable tech market in a bid to replicate Fitbit’s success by adding new revenue and data streams to their businesses. This will help drive … Continue reading →

Making U.K. directors personally liable for data privacy breaches

One proposal for the U.K.’s new Digital Economy Bill is for company directors to become personally liable for fines resulting from nuisance calls made by their companies. Continue reading →

Comment on the U.K.’s new National Cyber Security Strategy

In November 2016, the U.K. government published the new National Cyber Security Strategy 2016 to 2021, outlining the government’s plans for the U.K. and cyberspace. Continue reading →

Know your enemy: Inside the hacker’s mind

Companies rely on technology and outsourcing for critical activities, including storing sensitive client data and intellectual property, communicating and conducting transactions. This leaves them vulnerable to cyberattacks. Whether from company insiders or outside hackers, these attacks can interrupt business operations, … Continue reading →

Cyber attack: Ignorance and inaction are no defence

For any company that relies on computers (i.e. just about any company), cyber risk is real, serious and unavoidable. Given that all company directors are legally obliged to promote the success of the companies they serve and, in doing so, … Continue reading →