Skip to content

Sanford & Tatum Blog

All You Ever Wanted to Know About Insurance

Articles Related To…

Cyber Risks & Liabilities: The Importance of Data Backup and Recovery Plans for Businesses

The Importance of Data Backup and Recovery Plans for Businesses - In modern businesses, data is central to operations, customer management and decision-making. It is so integral to organizations that data loss from...

Read More


Cyber Risks & Liabilities: MFA Bypass Attacks Explained

MFA Bypass Attacks Explained - Multifactor authentication (MFA) is an integral component of cybersecurity. By requiring additional steps to access data, information is more secure and harder to steal. However,...

Read More


Risk Insights: Navigating Cybersecurity Challenges in the Construction Industry

Navigating Cybersecurity Challenges in the Construction Industry - The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of...

Read More


Legal Update : EBSA Releases Updated Cybersecurity Guidance for Employee Benefit Plans

EBSA Releases Updated Cybersecurity Guidance for Employee Benefit Plans - Through Compliance Assistance Release No. 2024-01, the U.S. Department of Labor’s Employee Benefits Security Administration (EBSA) is confirming...

Read More


Cyber Risks & Liabilities: Understanding Cybercriminals: Motivations, Methods and Protection Strategies

Understanding Cybercriminals: Motivations, Methods and Protection Strategies - Cyberattacks can impact a company in numerous ways. They can create significant financial losses through fines, lawsuits and business...

Read More


Cyber Risks & Liabilities: The Role of a Public Relations Specialist in Cyber Incident Response

The Role of a Public Relations Specialist in Cyber Incident Response - When cyber incidents strike, organizations need to respond swiftly and effectively to limit related losses. As such, it’s crucial for organizations...

Read More


Cyber Risks & Liabilities: SIM-Swapping Attacks Explained

SIM-Swapping Attacks Explained - In recent years, a growing number of organizations have implemented stronger cybersecurity measures, including multifactor authentication (MFA). This method requires a user to present...

Read More


Cyber Risks & Liabilities: The Role of a Data Breach Coach in Cyber Incident Response

The Role of a Data Breach Coach in Cyber Incident Response - Cybersecurity events can lead to businesses sustaining substantial financial and reputational damage. Recovering from these incidents can also be complicated...

Read More


2024 Midyear Market Outlook: Cyber Insurance

Cyber Insurance - Heightened claim frequency and severity have created a volatile cyber insurance market in recent years, with most policyholders facing ongoing premium increases. Fortunately, the segment experienced...

Read More


Cyber Risks & Liabilities: Defending AI Systems From Malicious Data Poisoning Attacks

Defending AI Systems From Malicious Data Poisoning Attacks - As the use of artificial intelligence (AI) and machine learning (ML) continues to grow, businesses that utilize these technologies must also be aware of the...

Read More


Legal Update: HHS Updates HIPAA FAQs Regarding Change Healthcare Cybersecurity Incident

- On May 31, 2024, the U.S. Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) updated its frequently asked questions (FAQs) regarding HIPAA and the recent cybersecurity incident involving...

Read More


Cyber Risks & Liabilities: Cybersecurity Awareness Programs: Benefits and Implementation

Cybersecurity Awareness Programs: Benefits and Implementation - Businesses of all sizes are susceptible to cyberattacks such as phishing scams, malware attacks and ransomware schemes, which can create significant...

Read More


Cyber Risks & Liabilities: ​Cloud Security Management Explained

Cloud Security Management Explained - Cloud computing refers to a pay-per-use service that equips users with on-demand access to a range of IT resources (e.g., databases, software, servers, networking and analytics...

Read More


Data Breach Class Actions Skyrocketed in 2023

- Data Breach Class Actions Skyrocketed in 2023 - Data breach class action lawsuits “exploded” in 2023, according to Duane Morris LLP’s Class Action Review 2024, becoming one of the fastest growing areas of litigation...

Read More


Cyber Risks & Liability: MGM Cyberattack Emphasizes Need for Layered Digital Defenses

MGM Cyberattack Emphasizes Need for Layered Digital Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned back in...

Read More


Cyber Update: MGM Cyberattack Emphasizes Need for Layered Defenses

MGM Cyberattack Emphasizes Need for Layered Defenses - The odds are stacked in favor of increasingly bold and sophisticated cybercriminals, as MGM Resorts International and Caesars Entertainment learned this week,...

Read More


Legal Update: SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures

- - SEC Adopts Final Rules for Public Companies’ Cybersecurity Disclosures - On July 26, 2023, the U.S. Securities and Exchange Commission (SEC) published final rules to enhance and standardize how companies disclose...

Read More


Cyber Update: Average Data Breach Costs $4.4M

- Average Data Breach Cost Hits All-time High of $4.4M - According to IBM’s annual Data Breach report, the average cost of a data breach reached an all-time global high of $4.45 million, up 2.3% from 2022 and 15.3%...

Read More


Cyber Liability: The Value of Cyber Insurance

- The Value of Cyber Insurance - As cyberattacks become more frequent and costly, it’s crucial for organizations to maximize their financial protection against related losses by purchasing sufficient insurance. Cyber...

Read More


Cyber Liability: Preventing Data Theft by Departing Employees

When employees leave a company, there is a heightened risk of data theft, which is also known as data leakage or exfiltration. This risk is present whether an employee’s departure is voluntary or not. The consequences...

Read More


Cyber Liability: 9 Cyber Risk Questions Every Board Should Ask

When a data breach or other cyber event occurs, the damages can be significant, often resulting in lawsuits, and serious financial losses. What’s more, cyber exposures impact businesses of all kinds, regardless of their...

Read More


Cyber Liability: Mobile Device Security Threats and How to Prevent Them

Mobile malware-malicious software designed to gain access to private data on mobile devices-is a growing threat to companies’ cybersecurity. As companies embrace remote work and more employees use their personal devices...

Read More


Cyber Liability: 10 Essential Cybersecurity Controls

Cyber incidents-including data breaches, ransomware attacks and social engineering scams-have become increasingly prevalent, impacting organizations of all sizes and industries. Such incidents have largely been brought...

Read More


Cyber Liability: Creating a Cybersecurity Culture

Employees are an organization’s first line of defense against cybercriminals. For this reason, they are also commonly targeted. In fact, the vast majority (88%) of data breaches are caused by employee mistakes,...

Read More


Risk Insights: General Cybersecurity Best Practices for Modern Vehicles

Modern vehicle technology has transformed in the past several years as autonomous driving, vehicle electrification and car connectivity features have become more common. While these digital innovations in the automotive...

Read More


Cyber Liability: Endpoint Detection and Response Explained

Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors security-related threat information and endpoint data to detect and respond to ransomware and other kinds of malware. It...

Read More


Identifying and Avoiding Phone Scams

Identifying and Avoiding Phone Scams - Every year, people report fraud, identity theft and bad business practices to the Federal Trade Commission (FTC) and law enforcement partners. According to FTC data, more than 2.8...

Read More


Cyber Update: Data Breaches Rose 68% in 2021

- - Data Breaches Rose 68% in 2021, Hitting a New High With No Signs of Slowing - According to the Identity Theft Resource Center’s (ITRC) annual report-which advocated for more effective laws and regulations to better...

Read More


National Cybersecurity Awareness Month


Cyber Update: Critical Infrastructure Cyberattacks on the Rise

Critical infrastructure cyberattacks are increasing in frequency according to Advisen’s loss database, and some experts are worried the worst is yet to come. There are sixteen industry sectors in the United States that...

Read More


Cyber Risks and Liabilities

Penetration Testing Explained - Keeping workplace technology up and running is vital to any organization’s success. While this task seems feasible, it’s growing harder and harder each year as cybercriminals expand their...

Read More


Cyber Update: White House Issues Ransomware Prevention Guidance to Businesses

White House Issues Ransomware Prevention Guidance to Businesses - In a recent letter addressed to corporate executives and business leaders, the White House emphasized that bolstering the nation’s resilience against...

Read More


Cyber Risks & Liabilities

The Importance of a Standalone Cyber Insurance Policy - Over the course of the past decade, many organizations have relied on standard property and liability coverage rather than a standalone cyber insurance policy to...

Read More


Cyber Security for Small Businesses

High-profile cyber attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber crime. Recent surveys conducted by the Small Business Authority, Symantec, Kaspersky Lab and the...

Read More


The Danger of Deepfakes

Deepfakes Explained - Deepfakes refer to sophisticated forgeries of an image, video or audio recording. Deepfakes have been around for years-you can even find a version of them in social media applications. For instance,...

Read More