Our Blog - Surety Matters

Our blog covering the latest in bonds and insurance
Displaying 316 results for: Fiduciary Duty
Cyber for Plan Sponsors 05.30.2019

Pension Industry Vulnerable to Cyber Attacks

According to a new report from Moody’s Investors Service, some of the industries most likely to be attacked by cyber attacks are finance, investment, and securities. This includes the retirement and pension industries as all…
Read Moreabout Pension Industry Vulnerable to Cyber Attacks

Pension Industry Vulnerable to Cyber Attacks
Cyber for Plan Sponsors 05.30.2019

The Fiduciary Duty of Protecting Against Cyber Attacks

Under ERISA, fiduciaries are subject to the prudent expert standard of care, in which they have to act with diligence, care, and skill an expert under the circumstances in their field would. They also owe…
Read Moreabout The Fiduciary Duty of Protecting Against Cyber Attacks

The Fiduciary Duty of Protecting Against Cyber Attacks
Cyber for Plan Sponsors 05.29.2019

There is No Consensus Way to Stop Retirement Plan Cyber Attacks

The United States doesn’t have a national regulatory system for governing cybersecurity. There’s no consensus framework in the country for evaluating the effectiveness of cyber protections. Based on the available information, it seems as if…
Read Moreabout There is No Consensus Way to Stop Retirement Plan Cyber Attacks

There is No Consensus Way to Stop Retirement Plan Cyber Attacks
Cyber for Plan Sponsors 05.29.2019

Types of Cyber Attacks for Plan Sponsors to Watch Out For

Retirement plans and plan sponsors are coming under attack from cyber attacks. The obvious response is to take precautions to prevent a cyber attack from hitting your retirement plan. But how can you do that without knowing…
Read Moreabout Types of Cyber Attacks for Plan Sponsors to Watch Out For

Types of Cyber Attacks for Plan Sponsors to Watch Out For
Cyber for Plan Sponsors 05.29.2019

Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks

Your company computer may have an anti-virus program installed on it, but if you think that’s enough to prevent your retirement plan from succumbing to cyber attacks and data breaches, you have another thing coming….
Read Moreabout Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks

Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks
Cyber for Plan Sponsors 05.29.2019

DOL: Plan Sponsors Must Protect Electronic Plan Information

ERISA does not specifically lay out rules and regulations regarding protecting plan data, but the U.S. Department of Labor has addressed the vulnerability of electronically sent plan information. In Regulation Section 2520.104b-1(c), the DOL stated that…
Read Moreabout DOL: Plan Sponsors Must Protect Electronic Plan Information

DOL: Plan Sponsors Must Protect Electronic Plan Information
Cyber for Plan Sponsors 05.29.2019

Survey: 83% of Organizations Have Had a Data Breach

According to a survey of over 1,000 United States companies conducted by Opinion Matters, 83% of surveyed companies have experienced some sort of accidental data breach. More exposure occurred through employees accidentally exposing data through…
Read Moreabout Survey: 83% of Organizations Have Had a Data Breach

Survey: 83% of Organizations Have Had a Data Breach
Cyber for Plan Sponsors 05.29.2019

Cybersecurity and Retirement Plans: Unanswered Questions

With cyber attacks and data breaches becoming more and more commonplace, it’s become fair to ask where cybersecurity fits within the duties and responsibilities of retirement plan fiduciaries and participants Congress has started asking the…
Read Moreabout Cybersecurity and Retirement Plans: Unanswered Questions

Cybersecurity and Retirement Plans: Unanswered Questions
Cyber for Plan Sponsors 05.29.2019

Average Time Taken to Identify and Contain a Data Breach

According to a survey by the Ponemon Institute of 477 companies that experienced a data breach in 2018, the average number of days to even identify a data breach could be as high as 221…
Read Moreabout Average Time Taken to Identify and Contain a Data Breach

Average Time Taken to Identify and Contain a Data Breach