Hacks, Ransomware and Breaches – Oh My!

Even though I’m a techie neophyte, I began writing this article by jotting down a few general ideas and, in no time flat, I had a list nearly a page long. The subject of risk management and computer security, breaches and hackings is that extensive.

So, let’s start with the basics. Cyber threats (“exposures,” in risk management lingo), are internal and external, intentional and unintentional.

Selecting a Nearly-Infallible Machine: Insurance Company Ratings

Imagine needing a machine to work 365 days per year, 24/7.

Imagine the machine must fulfill a specific purpose for no less than three years, and may be called upon to perform certain tasks, which cannot be duplicated by any similar or replacement machine, for 20 years after the initial three. Machine breakdowns are unacceptable and such failures have grave financial and reputational implications for you on a professional and personal level.