|
|
At Kapnick we have several teams of experts in diverse industry verticals. MEET OUR EXPERTS BELOW |
|
|
|
|
|
|
|
|
At Kapnick we have several teams of experts in diverse industry verticals. MEET OUR EXPERTS BELOW |
Our Property Management Experts
|
|
|
|
|
|
|
Topics: Cyber Liability Insurance
Posted by kapnick on Jul 19, 2016 3:15:27 PM
Pokémon Go is more than just a cultural phenomenon; it’s now the most popular mobile game in U.S. history. Take a look around any bustling intersection or local gathering place and you’re likely to see gamers of all ages glued to their phones in search of a high-scoring Pokémon character.
What’s Pokémon Go About?
The game allows players to cross over from the fantasy gaming world of Pokémon to explore the real world. Users will look for creatures with names such as Diglett, Doduo, and Ponyta as they pop up on screen. These characters can appear almost anywhere – on someone’s shoulder, along a sidewalk, in a trash can or behind a giant light pole.
The app, created by San Francisco-based software developer Niantic Labs, can either be downloaded from the Pokémon website or through Google Play. It should be noted that Google Play requires users to login via their Google credentials, giving the app access to all of a users’ Google-related information including Gmail, Google Docs and Google Photos, or through iTunes for the iOS platform.
Once Niantic Labs discovered this inherent flaw, they issued a statement that they were working on an update that will limit the information requested to only basic Google profile data. (It should be noted that users will not have to take any action to fix the flaw.)
Posted by Rene Carpenter on Sep 23, 2015 11:14:00 AM
Trending: Help Delete Cyber Crime
Sophisticated “phishing” scams are increasing at an alarming rate, making it easier than ever for criminals to gain access to your company’s bank accounts. If not detected quickly, these cyber attacks could result in significant monetary losses.
The Federal Trade Commission sent out a special alert indicating that Web-based commercial Electronic Funds Transfer (EFT) origination applications are being targeted by malicious software, including Trojan horse programs, key loggers, and other spoofing techniques designed to circumvent online authentication methods.
Topics: Cyber Liability Insurance
Posted by Stew Nelson on Sep 22, 2015 12:00:00 PM
"Internet crimes pose one of the greatest challenges in crime fighting history as federal, state and local law enforcement try to keep pace with fraudsters looking to outsmart today’s cyber security measures."
- WIVB
________________________________________________________________
Topics: Cyber Liability Insurance, Featured Posts
"As we bring more aspects of our lives online — social, shopping, banking, storage — the risks of cyber crime increase."
- Re/Code
________________________________________________________________
Topics: Cyber Liability Insurance, Featured Posts
Posted by kapnick on Sep 22, 2015 11:36:00 AM
"Organizations are collecting and using data faster than they are able to keep it secure."
Remember, I am not a lawyer but for those of you that have a hard time reading regulations, here is a summary of the Identity Theft Protection Act, Act 452 of 2004. This act covers notification of state residents that they are the victims of an unauthorized access of a database with their personally identifiable information or personal health information.
Topics: Cyber Liability Insurance, Featured Posts
"While security risks can also be reduced on hardware through the use of firewalls, antiviruses and anti-spyware, encryption can commonly be considered the last line of defense. If intruders try to knock down your security measures to capture your data, their efforts will be unsuccessful as long as your data is encrypted."
_____________________________________________________________________________________
OK! Let’s go back to basics! Who needs to encrypt Personal Information? Also, who needs Cyber Liability insurance?
Topics: Cyber Liability Insurance, Featured Posts
Posted by Stew Nelson on Jun 1, 2015 3:06:02 PM
INTRODUCTION:
I have been in insurance long enough to understand that just when you think you have it all figured out….you should look around for the 2X4 that is certainly traveling toward your forehead! I experienced this feeling last week when I was asked by a colleague if “social engineering attacks,” aka Phishing attacks that dupe unwitting employees to voluntarily transfer money or property to phony bank accounts would be covered under the Computer Fraud or Wire Fraud provisions of a standard Crime policy and or Cyber Liability policy.
Topics: Cyber Liability Insurance
If you collect Personal Identifiable Information (PII) from your clients, tenants or even employees then you have good reason to be concerned by the threat of a Data Breach.
Topics: Cyber Liability Insurance
If you have a Point of Sale, POS, system you need to read this latest Informational Release from iSight Partners. Additionally, if you are one of the 70 million Americans that had their data compromised in the Target or Nieman Marcus data breaches you should read this also.
Topics: Cyber Liability Insurance, Featured Posts
The Kapnick Insurance and Wellness Blog posts all kinds of interesting and timely blog posts on a weekly basis. We will keep you up to speed on all things insurance and keep you healthy at the same time!
What to expect:
© Kapnick Insurance Group. | Privacy Policy & Compensation