Our Blog - Surety Matters

Our blog covering the latest in bonds and insurance
Displaying 5 results for: cyber attack tactics
Cyber for Plan Sponsors 09.26.2020

Identify Theft—Are Your Benefit and Retirement Plans Safe?

Identity theft has been on the rise—and that means plan sponsors have to up their cybersecurity efforts. According to AARP: Identity theft occurs when someone obtains someone else’s personal information, such as a Social Security…
Read Moreabout Identify Theft—Are Your Benefit and Retirement Plans Safe?

Identify Theft—Are Your Benefit and Retirement Plans Safe?
Cyber for Plan Sponsors 08.17.2020

What Is a Data Breach and How Can I Effectively Handle One?

According to the cybersecurity hub Norton, a data breach is a “security incident whereby information is accessed without authorization.” It’s crucial to highlight that not all data breaches are deliberate! There have been cases where…
Read Moreabout What Is a Data Breach and How Can I Effectively Handle One?

What Is a Data Breach and How Can I Effectively Handle One?
Cyber for Plan Sponsors 08.17.2020

What is the Cost of a Data Breach?

Like any other variety of pervasive thievery, data breaches emerge with a ponderous cost. Data thieves utilize evolving criminal techniques to carefully slip past sub-par security measures and expeditiously dine on a company’s finest sensitive…
Read Moreabout What is the Cost of a Data Breach?

What is the Cost of a Data Breach?
Cyber for Plan Sponsors 08.11.2020

The 14 Largest Data Breaches of the 21st Century

Unfortunately, in this day and age of businesses and consumers interacting online, data breaches are more commonplace. Roughly 3.5 billion people had their personal information swiped in the top two of the 14 largest cyber…
Read Moreabout The 14 Largest Data Breaches of the 21st Century

The 14 Largest Data Breaches of the 21st Century
Cyber for Plan Sponsors 07.02.2019

Tactics Utilized in Data Breaches

The popular idea of a cyber attack or data breach usually involves a hacker breaking into a computer system. But that is usually not the case. There are a multitude of methods used by cyber…
Read Moreabout Tactics Utilized in Data Breaches

Tactics Utilized in Data Breaches