Call Us CALL US TODAY | 262-697-9600
Share | | RSS Google RSS

Sparks Insurance, Inc. Blog: cyber liability

View the latest blog posts from Sparks Insurance, Inc..

In Alaska, beasts come in the form of enormous, long-haired, silver salmon-mongering grizzly bears. Recently, while cleaning freshly caught silver salmon creek-side, a hungry grizzly bear appeared. We were not above fleeing to the safety of the garage to finish fileting salmon. READ MORE >>

Big companies like Target, Yahoo and Equifax are typically the unhappy recipients of big news coverage following data disasters. This is not surprising, given the size of the events. At Target, credit and debit card information or contact information for approximately 40 million people was purloined, leading to the resignations of both the CEO and CIO. READ MORE >>

Half of all small and midsize businesses (SMBs) in the U.S. experienced a data breach in the past year — and 55% experienced a cyber attack. So why are so many SMBs not making cyber insurance a priority? According to the Insurance Information Institute, 34% of SMBs do not believe they will be the target of an attack, while 37% cited cost as a reason. READ MORE >>

Although cyber attacks are becoming more of a certainty than a possibility, there are still numerous companies and organizations that are not purchasing cyber insurance. In addition, many are not taking proactive measures to protect data such as updating software programs and installing security updates in a timely manner. READ MORE >>

This year’s top six cyber risks for businesses, according to The Chertoff Group principal Adam Isles, include: increase in destructive attacks targeting industrial control systems; expansion of IoT as a threat vector; evolution in nation-state activity tradecraft, advances in identity s... READ MORE >>

Data Privacy Day is observed annually on January 28th. The purpose of this day is to increase awareness and promote privacy and data protection best practices among consumers, organizations and anyone who deals with private information. READ MORE >>

In the midst of a busy workday, you receive a phone call from an outside number. The caller identifies themselves as a member of tech support calling about your computer. They may request your password, ask you to download a file, or request remote connection to your system. READ MORE >>

A quickly spreading ransomware attack that affected more than 200,000 computers globally seems to have slowed its spread, although most security experts expect a quick resurgence in a new form. Businesses and computer users around the world were confronted with a message on their screen st... READ MORE >>

Public Wi-Fi helps us stay connected no matter where we go. It’s convenient to use at a coffee shop, a neighborhood restaurant or the airport, but how safe is it? Unfortunately, cyber criminals can log in to the same free network that you do and attempt to gain access to your devices and personal information. READ MORE >>

  In the digital world, our technology is an extension of ourselves. Our personalities, friendships and much more are on the internet and in the cloud, especially for small businesses. In many cases, the small business owner blurs the lines between personal and professional, using social media to reach potential clients as well as existing customers. READ MORE >>

1 2 Last
Blog Archive


View Mobile Version
We are licensed in most US states. View our map for additional information on coverages available based on your location. 
Carriers
Carriers
Carriers
Carriers
Carriers
Carriers
Carriers
© Copyright. All rights reserved. THIS SITE IS NOT TO BE CONSTRUED AS SOLICITATION WHERE IT WOULD BE PROHIBITED BY STATE LAWS