Tag

Cybersecurity

Think Twice Before Using a Public Charging Station!

By | Cybersecurity | No Comments

Okay; we’ve all been there. You’re at the airport, wrapping up a successful business trip and your cellphone power is running low. You look around for a public charging station while you wait for your seating zone to be called. As you scan the crowded noisy terminal, you spot an open seat with a charging station right next to it. You are exhausted from your trip, your feet ache and you can’t believe your luck!…

Read More

Self-Driving Cars: The Local Impact

By | Risk control | No Comments

At OneBeacon, specialty expertise matters. One way that we continually demonstrate our targeted expertise is by publishing articles in industry trade publications. Today, we’re pleased to share an article authored by Kenny Smith, Risk Control Manager supporting OneBeacon Government Risks. His topic was autonomous vehicles and how this innovative transportation mode will impact public entities. Titled “Here’s how self-driving vehicles are impacting cities and towns” this article appeared in PropertyCasualty360 on June 6. For further…

Read More

How to be Safer When Using Public WiFi

By | Cybersecurity | No Comments

  This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Norman Thoms. – Read more here. Public WiFi spots are everywhere these days. They’re convenient, especially when you’re on the go, but they could also leave your information vulnerable. Here are some tips to stay safer if you use public WiFi. Avoid accessing confidential information When connected to public WiFi, don’t log on…

Read More

Warning: This new phishing scam is costing businesses thousands

By | Cybersecurity | No Comments

This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Monique Ferraro. Whether it’s a phishing scheme or malware, most cyber attacks originate with an email. The most pervasive and costly cyber frauds affecting businesses this year are phishing schemes in which the perpetrator claims to be a senior executive, such as the CEO or CFO, requesting a funds transfer or employee W-2 records….

Read More

Cisco Publishes Annual Cybersecurity Report

By | Cybersecurity | No Comments

Cisco recently published its 2017 Annual Cybersecurity Report. According to the study, over one-third of organizations that experienced a cyber breach in 2016 reported a loss of customers and revenues. When breaches occur, operations and finance were the functions most likely to be affected (36 percent and 30 percent, respectively), followed by brand reputation and customer retention (both at 26 percent). Acess the full report, including other highlights here.  

Read More

Cybersecurity Insights = RSA Conference

By | Conference insights | No Comments

This week, we’re in San Francisco for the annual RSA Conference, a global information security conference and exposition. We’re appreciating the opportunity to hear from many cybersecurity experts firsthand, including the keynote Cryptographers’ Panel. This group reviewed the latest advances in cryptography, including research areas to watch in 2017 and new threats facing the field.  

Read More

Ransomware Attacks: Stay Aware; Stay Alert

By | Cybersecurity | No Comments

Last week, several reports cited the unauthorized access to corporate databases through vulnerable platforms. The extortionists are demanding payments in exchange for the data, but apparently most data was not being returned upon payment of those ransoms. The initial attacks targeted databases running on MongoDB and then copycat attacks occurred on Elasticsearch servers. Our partners at BitSight alerted us to this matter and will continue to monitor and offer updates. Feel free to share this…

Read More

Pay Up or Else: Digital Piracy

By | Cybersecurity | No Comments

We’re pleased to share our teammate Joe Budzyn’s recent article on ransomware, which was published by Carrier Management. In this piece, Joe defines ransonware, outlines its inherent risks and offers steps for minimizing its impact. For more articles authored by OneBeacon Technology Insurance specialists, visit our website newsroom.

Read More

Stay Security Smart During the Holidays!

By | Cybersecurity, Risk control | No Comments

You may have heard the term “botnet” as relates to cybersecurity.  A botnet is a collection of devices that have been infected by a hacker’s program. Hackers routinely scan the internet looking for online devices and once identified, they are probed for security controls. If none are found, the hacker will install a program and add the device to their botnet. Over time, botnets can include millions of devices. Once a device is infected, the…

Read More

Orlando Beyond Disney: ECIA Regional Series

By | Conference insights, Cybersecurity | No Comments

This is a busy conference day for us! Joe Budzyn is in Orlando as a featured speaker for today’s Electronic Components Industry Association (ECIA) regional conference. Joe will speak to the group late this afternoon in a session titled “Cybersecurity: Are You Protected and Prepared?” From hacking and phishing to outright theft and vandalism, he will share his expertise for minimizing business exposures and losses from cyber events. For insights on this topic, feel free…

Read More