Skip to content

Sanford & Tatum Blog

All You Ever Wanted to Know About Insurance

Articles Related To…

Coverage Insights: Contingent Business Interruption Insurance for Cyber Events

Contingent Business Interruption Insurance for Cyber Events - In today’s evolving risk landscape, organizations of all sizes and sectors face a wide range of cyberthreats. Amid advancing attack techniques and growing...

Read More


Cyber Risks & Liabilities: The Role of a Public Relations Specialist in Cyber Incident Response

The Role of a Public Relations Specialist in Cyber Incident Response - When cyber incidents strike, organizations need to respond swiftly and effectively to limit related losses. As such, it’s crucial for organizations...

Read More


Cyber Risks & Liabilities : The Role of Digital Forensics and Incident Response in Cybersecurity

The Role of Digital Forensics and Incident Response in Cybersecurity - As the cybersecurity landscape evolves and cybercriminals continue to develop new ways to infiltrate computer systems and networks, employers must...

Read More


Cyber Risks & Liabilities: SIM-Swapping Attacks Explained

SIM-Swapping Attacks Explained - In recent years, a growing number of organizations have implemented stronger cybersecurity measures, including multifactor authentication (MFA). This method requires a user to present...

Read More


Cyber Risks & Liabilities: The Role of a Data Breach Coach in Cyber Incident Response

The Role of a Data Breach Coach in Cyber Incident Response - Cybersecurity events can lead to businesses sustaining substantial financial and reputational damage. Recovering from these incidents can also be complicated...

Read More


Cyber Risks & Liabilities: Cybersecurity Awareness Programs: Benefits and Implementation

Cybersecurity Awareness Programs: Benefits and Implementation - Businesses of all sizes are susceptible to cyberattacks such as phishing scams, malware attacks and ransomware schemes, which can create significant...

Read More


Cyber Risks & Liabilities: ​Cloud Security Management Explained

Cloud Security Management Explained - Cloud computing refers to a pay-per-use service that equips users with on-demand access to a range of IT resources (e.g., databases, software, servers, networking and analytics...

Read More


Data Breach Class Actions Skyrocketed in 2023

- Data Breach Class Actions Skyrocketed in 2023 - Data breach class action lawsuits “exploded” in 2023, according to Duane Morris LLP’s Class Action Review 2024, becoming one of the fastest growing areas of litigation...

Read More


Cyber Risks & Liability: MGM Cyberattack Emphasizes Need for Layered Digital Defenses

MGM Cyberattack Emphasizes Need for Layered Digital Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned back in...

Read More


Cyber Update: MGM Cyberattack Emphasizes Need for Layered Defenses

MGM Cyberattack Emphasizes Need for Layered Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned this week,...

Read More


Legal Update: SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures

- - SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures - On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) published final rules to enhance and standardize how companies disclose...

Read More


Cyber Update: Average Data Breach Costs $4.4M

- Average Data Breach Cost Hits All-time High of $4.4M - According to IBM’s annual Data Breach report, the average cost of a data breach reached an all-time global high of $4.45 million, up 2.3% from 2022 and 15.3%...

Read More


Cyber Liability: The Value of Cyber Insurance

- The Value of Cyber Insurance - As cyberattacks become more frequent and costly, it’s crucial for organizations to maximize their financial protection against related losses by purchasing sufficient insurance. Cyber...

Read More


Cyber Liability: 9 Cyber Risk Questions Every Board Should Ask

When a data breach or other cyber event occurs, the damages can be significant, often resulting in lawsuits, and serious financial losses. What’s more, cyber exposures impact businesses of all kinds, regardless of their...

Read More


Cyber Liability: Mobile Device Security Threats and How to Prevent Them

Mobile malware-malicious software designed to gain access to private data on mobile devices-is a growing threat to companies’ cybersecurity. As companies embrace remote work and more employees use their personal devices...

Read More


Cyber Liability: Email Security Best Practices

Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach valuable business data. In fact, 94% of...

Read More


Cyber Liability: 10 Essential Cybersecurity Controls

Cyber incidents-including data breaches, ransomware attacks and social engineering scams-have become increasingly prevalent, impacting organizations of all sizes and industries. Such incidents have largely been brought...

Read More


Cyber Liability: Endpoint Detection and Response Explained

Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and other kinds of malware. It...

Read More


Cyber Liability: The Importance of Two-factor Authentication

As cyber attacks become more and more common, protecting your data is increasingly difficult. In fact, a study from Juniper Research found that by 2023, cyber criminals are expected to steal an estimated 33 billion...

Read More


Cyber Liability: Cyber Hygiene Best Practices

Cyber Hygiene Best Practices - As cyberattacks become more frequent and severe it is increasingly important for organizations to practice good cyber hygiene to minimize their exposure to risk. Cyber hygiene refers to...

Read More


Cyber Liability: Cyber Security for Small Businesses

Cyber Security for Small Businesses - High-profile cyber attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber crime. Recent surveys conducted by the Small Business Authority,...

Read More


Cyber Liability: Hacktivism Explained

Hacktivism Explained - Hackers exploit virtual vulnerabilities to gain access to networks and devices illegally. While most engage in this activity for financial gain, others, called hacktivists, have different...

Read More


Cyber Liability: Jackware Cyberattacks Explained

Jackware Cyberattacks Explained - Ransomware incidents entail cybercriminals compromising their victims’ computers or servers with malware and demanding large payments in order to restore the technology (as well as any...

Read More


Cyber Risks and Liabilities

Penetration Testing Explained - Keeping workplace technology up and running is vital to any organization’s success. While this task seems feasible, it’s growing harder and harder each year as cybercriminals expand their...

Read More