14 Feb

A cyber insurance provider can decide not to pay a policy claim

As organisations have become increasingly dependent on technology to do business, cyber insurance has developed into one of the most important types of ...

Read Full Article
07 Feb

A cyber insurance provider can deny a claim if you've given the wrong answer on your application

As organisations have become increasingly dependent on technology to do business, cyber insurance has developed into one of the most important types of ...

Read Full Article
31 Jan

My business insurance policy provides cover against cyber risk

As organisations have become increasingly dependent on technology to do business, cyber insurance has developed into one of the most important types of ...

Read Full Article
24 Jan

If I buy cyber insurance, I don't need to worry about data breaches

As organisations have become increasingly dependent on technology to do business, cyber insurance has developed into one of the most important types of ...

Read Full Article
10 Jan

New Year's Resolution - Cyber Insurance

As we enter 2019 the complexity and cost of cyber crime and data breach continues to grow. Comprehensive security for your IT environment is essential ...

Read Full Article
08 Oct

The cost of cyber security for your small business

Earlier this year, Ticketmaster had the grim task of issuing a memo that no business wants to issue. It was addressed to its customers and it told them ...

Read Full Article
03 Oct

I’m not an online business, do I still need cyber insurance?

Online businesses are obvious buffets of data in the hungry eyes of cyber criminals but it’s important to recognise that cyber thugs have designs on ...

Read Full Article
27 Sep

Scams, cons and grifters: a history of social engineering fraud

Did you know there are 1000s of cons perpetrated online every day? And whilst ransomware attacks and data security breaches tend to get the majority of ...

Read Full Article
27 Jul

Cyber Insurance for the Breach Detection Lag

Do you know there is often a lag between when a network breach occurs and when it is discovered. Hackers get access to your Network and then bide their ...

Read Full Article