kapnicktagline1

Insurance and Wellness Blog

Developing a Data Breach Incident Response Plan

Posted by kapnick on Jan 27, 2017 9:04:03 AM

 

DID YOU KNOW THAT DATA RECORDS COMPROMISED
IN FIRST HALF OF 2016 WERE

554,454,942

DON'T BE PART OF 2017 STATS - Talk with a Kapnick Specialist Today to Determine your Industry Specific Coverage Needs.

Data breaches and theft are reported daily, and hackers continue to find ways to attack data, in spite of tools and strategies to tighten data security. Every business should plan for the unexpected, including a data breach that can hurt your brand, customer confidence, reputation and ultimately—your business.

(CONTINUE READING)
 
Put your data and network security to the test.
 
Is Your Data Secured?
Help protect your data from cyber attacks. Find gaps with The Cyber Risk Pressure Test from Travelers!

At Kapnick we have several teams of experts in diverse industry verticals. 

MEET OUR EXPERTS BELOW

 Our Property Management Experts
Micah Teets

(734) 929-6580
Email Me

Brad Labadie

(734) 929-6590
Email Me

Michael Kyle

(734) 929-6591
Email Me

Jeff Blanton

(734) 929-6589
Email Me

Our Transportation Experts
Doug Bryant

(734) 929-6580
Email Me

Mark Arbaugh

(734) 929-6590
Email Me

Beth Furguson

(517) 266-6454
Email Me

Meet Our Construction Experts
Bob Weiland

(248) 327-0450
Email Me

Michael Kyle

(734) 929-6591
Email Me

Mike Rutkowski

(248) 595-0724
Email Me

Our Education Experts
David Gangi

(248) 327-0462
Email Me

Beth Ferguson

(517) 266-6454
Email Me

Tyrone Jordan

(734) 929-6588
Email Me

Todd Gentner

(517) 265-1897
Email Me

Our Agribusiness Experts
Bill Lyle

(734) 274-4442
Email Me

Jeff Blanton

(734) 929-6589
Email Me

Micah Teets

(248) 327-0455
Email Me

Our Manufacturing Experts
Bob Weiland

(248) 327-0450
Email Me

Michael Kyle

(734) 929-6591
Email Me

Joe Buick

(517) 266-6574
Email Me

Debbie Youngs

(734) 929-6585
Email Me

Rubin Torrez

(248) 595-0731
Email Me

Our Wellness Expert
"I work with clients to help them develop a health management program that will enable them to control rising health care costs while building a healthier, more productive work force."

 

Sarah Szul
Wellness Business Development Specialist
Read More

Topics: Cyber Liability Insurance

Pokémon Go is APPealing to Gamers, but Creating Increased Risks

Posted by kapnick on Jul 19, 2016 3:15:27 PM


Pokémon Go is more than just a cultural phenomenon; it’s now the most popular mobile game in U.S. history. Take a look around any bustling intersection or local gathering place and you’re likely to see gamers of all ages glued to their phones in search of a high-scoring Pokémon character.

What’s Pokémon Go About?

The game allows players to cross over from the fantasy gaming world of Pokémon to explore the real world. Users will look for creatures with names such as Diglett, Doduo, and Ponyta as they pop up on screen. These characters can appear almost anywhere – on someone’s shoulder, along a sidewalk, in a trash can or behind a giant light pole.

The app, created by San Francisco-based software developer Niantic Labs, can either be downloaded from the Pokémon website or through Google Play. It should be noted that Google Play requires users to login via their Google credentials, giving the app access to all of a users’ Google-related information including Gmail, Google Docs and Google Photos, or through iTunes for the iOS platform.

Once Niantic Labs discovered this inherent flaw, they issued a statement that they were working on an update that will limit the information requested to only basic Google profile data. (It should be noted that users will not have to take any action to fix the flaw.)

 

Read More

Topics: Risk Management/Services, Cyber Liability Insurance

Cyber Safety: Preventing EFT and Computer Fraud

Posted by Rene Carpenter on Sep 23, 2015 11:14:00 AM


Trending: Help Delete Cyber Crime

Sophisticated “phishing” scams are increasing at an alarming rate, making it easier than ever for criminals to gain access to your company’s bank accounts. If not detected quickly, these cyber attacks could result in significant monetary losses.

The Federal Trade Commission sent out a special alert indicating that Web-based commercial Electronic Funds Transfer (EFT) origination applications are being targeted by malicious software, including Trojan horse programs, key loggers, and other spoofing techniques designed to circumvent online authentication methods.


Read More

Topics: Cyber Liability Insurance

Cyber Liability - Staying one Step Ahead of the Cyber Thieves

Posted by Stew Nelson on Sep 22, 2015 12:00:00 PM

"Internet crimes pose one of the greatest challenges in crime fighting history as federal, state and local law enforcement try to keep pace with fraudsters looking to outsmart today’s cyber security measures."

- WIVB

________________________________________________________________

by Stew Nelson

Read More

Topics: Cyber Liability Insurance, Featured Posts

5 Things You Should do if You Get Hacked

Posted by kapnick on Sep 22, 2015 12:00:00 PM

"As we bring more aspects of our lives online — social, shopping, banking, storage — the risks of cyber crime increase."

- Re/Code

________________________________________________________________

Stew Nelson - Senior Risk Advisor
Read More

Topics: Cyber Liability Insurance, Featured Posts

Reporting and Notification Rules Regarding Data Breaches in Michigan

Posted by kapnick on Sep 22, 2015 11:36:00 AM

"Organizations are collecting and using data faster than they are able to keep it secure."

- TeachPrivacy

Stew Nelson - Senior Risk Advisor

Remember, I am not a lawyer but for those of you that have a hard time reading regulations, here is a summary of the Identity Theft Protection Act, Act 452 of 2004. This act covers notification of state residents that they are the victims of an unauthorized access of a database with their personally identifiable information or personal health information.

Read More

Topics: Cyber Liability Insurance, Featured Posts

Back to Basics - Cyber Liability

Posted by kapnick on Sep 22, 2015 11:00:00 AM

"While security risks can also be reduced on hardware through the use of firewalls, antiviruses and anti-spyware, encryption can commonly be considered the last line of defense. If intruders try to knock down your security measures to capture your data, their efforts will be unsuccessful as long as your data is encrypted."

- Connectria

_____________________________________________________________________________________

OK! Let’s go back to basics! Who needs to encrypt Personal Information? Also, who needs Cyber Liability insurance?

Read More

Topics: Cyber Liability Insurance, Featured Posts

Exclusions in Crime and Cyber Policies That affect your Balance Sheet

Posted by Stew Nelson on Jun 1, 2015 3:06:02 PM


INTRODUCTION:

I have been in insurance long enough to understand that just when you think you have it all figured out….you should look around for the 2X4 that is certainly traveling toward your forehead!   I experienced this feeling last week when I was asked by a colleague if “social engineering attacks,” aka Phishing attacks that dupe unwitting employees to voluntarily transfer money or property to phony bank accounts would be covered under the Computer Fraud or Wire Fraud provisions of a standard Crime policy and or Cyber Liability policy.

Read More

Topics: Cyber Liability Insurance

How Much Could a Data Breach Cost?

Posted by kapnick on Oct 24, 2014 3:00:00 PM


If you collect Personal Identifiable Information (PII) from your clients, tenants or even employees then you have good reason to be concerned by the threat of a Data Breach.

Read More

Topics: Cyber Liability Insurance

Data Breaches and Point of Sale Systems

Posted by kapnick on Jan 29, 2014 3:54:58 PM

Stew Nelson
Senior Risk Advisor

If you have a Point of Sale, POS, system you need to read this latest Informational Release from iSight Partners. Additionally, if you are one of the 70 million Americans that had their data compromised in the Target or Nieman Marcus data breaches you should read this also.

Read More

Topics: Cyber Liability Insurance, Featured Posts