The vulnerability and uncertainty of the pandemic has fertilized a breeding ground for new attacks.
Cybersecurity is no longer just an IT issue — it must be a company-wide concern.
If your HR department is breached, it can do irreparable damage to both the company as a whole and to the lives of the employees.
No matter your company's size or your role in it, cybersecurity should be on your radar.
Not being prepared for an attack can cause serious harm to both companies and their employees.
The private sector could learn a great deal from the federal government about securely managing teleworking employees. Here are quick and inexpensive steps to secure remote workers.
Plan sponsors and fiduciaries should be aware that the DOL cybersecurity guidance likely applies to all plans governed by ERISA, not just retirement plans.
This article provides some eye-opening observations about cyberattacks, practical tips to help avoid becoming a victim and advice on what to do if something happens.
With more work being done remotely, the risk of a cyber attack has increased exponentially.
A step-by-step guide to business continuity and crisis communication planning.
Trending Stories
- 1The Role HSAs Play in Helping Employees Achieve Financial Security
- 2Pregnant Workers Fairness Act: EEOC's final rules include abortion accommodations
- 3AI eye exams are proving their worth — providing quick diagnoses, without a doctor
- 4House GOP members attempt to overturn DOL's ESG rule, again
- 5CMS: Final rule on Medicare Advantage plans caps comp for brokers, agents
{ "data": { "slug": "get-ready-for-increased-cyberattacks", "title": "Get Ready for Increased Cyberattacks", "type": "regulated insights", "packageUrl": "", "summary": "", "cssFile": "", "imageUrl": "", "mediaUrl": "", "blurb": "", "articles": [ { "uri": "/2022/02/04/5-tips-to-reduce-your-cybersecurity-risk/", "title": "5 tips to reduce your cybersecurity risk", "summary": "The vulnerability and uncertainty of the pandemic has fertilized a breeding ground for new attacks.", "byline": "Ben Goodman", "kicker": "Best Practices", "tags": [], "prettyDate": "February 04, 2022", "wordcount": "1422", "timeToRead": "8 minute", "readtime": "8", "authors": [ { "webUrl": "/author/profile/ben-goodman/", "name": "Ben Goodman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/04/cyber-security-technology.jpg", "width": "616", "height": "411" } }, { "uri": "/2020/01/08/how-to-prepare-for-and-address-a-cyberattack-412-91969/", "title": "How to prepare for and address a cyberattack", "summary": "Cybersecurity is no longer just an IT issue — it must be a company-wide concern.", "byline": "Nicholas M. Cushmore", "kicker": "Best Practices", "tags": [ "canonical:https://www.propertycasualty360.com/2020/01/03/how-to-prepare-for-and-address-a-cyberattack" ], "prettyDate": "January 08, 2020", "wordcount": "1284", "timeToRead": "7 minute", "readtime": "7", "authors": [ { "webUrl": "/author/profile/nicholas-m-cushmore/", "name": "Nicholas M. Cushmore" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/01/cyberattack.jpg", "width": "616", "height": "372" } }, { "uri": "/2021/08/06/how-to-keep-hr-data-safe-from-cybercrime/", "title": "How to keep HR data safe from cybercrime", "summary": "If your HR department is breached, it can do irreparable damage to both the company as a whole and to the lives of the employees.", "byline": "Dakota Murphey", "kicker": "Commentary", "tags": [], "prettyDate": "August 06, 2021", "wordcount": "863", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/dakota-murphey/", "name": "Dakota Murphey" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/01/Data-security-Article-202101071419.jpg", "width": "620", "height": "372" } }, { "uri": "/2019/10/22/cybersecurity-theres-always-more-you-can-do/", "title": "Cybersecurity: There's always more you can do", "summary": "No matter your company's size or your role in it, cybersecurity should be on your radar.", "byline": "Emily Payne", "kicker": "Best Practices", "tags": [], "prettyDate": "October 22, 2019", "wordcount": "1387", "timeToRead": "7 minute", "readtime": "7", "authors": [ { "webUrl": "/author/profile/emily-payne/", "name": "Emily Payne" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2019/03/01-cyber-insurance-istock.jpg", "width": "620", "height": "372" } }, { "uri": "/2021/12/29/4-tips-for-effective-employee-communication-in-the-event-of-a-cyberattack/", "title": "4 tips for effective employee communication in the event of a cyberattack", "summary": "Not being prepared for an attack can cause serious harm to both companies and their employees.", "byline": "Terri Mock", "kicker": "Best Practices", "tags": [], "prettyDate": "December 29, 2021", "wordcount": "1057", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/terri-mock/", "name": "Terri Mock" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/01/Data-security-Article-202101071419.jpg", "width": "620", "height": "372" } }, { "uri": "/2020/07/14/working-remotely-here-are-4-often-overlooked-steps-that-secure-your-data-412-100981/", "title": "Working remotely? Here are 4 often-overlooked steps that secure your data", "summary": "The private sector could learn a great deal from the federal government about securely managing teleworking employees. Here are quick and inexpensive steps to secure remote workers.", "byline": "Kenya Parrish-Dixon", "kicker": "Commentary", "tags": [ "canonical:https://www.law.com/legaltechnews/2020/07/10/working-remotely-here-are-4-often-overlooked-steps-that-secure-your-data" ], "prettyDate": "July 14, 2020", "wordcount": "1570", "timeToRead": "8 minute", "readtime": "8", "authors": [ { "webUrl": "/author/profile/kenya-parrish-dixon/", "name": "Kenya Parrish-Dixon" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/07/Data-Security-Article-201912161922.jpg", "width": "620", "height": "372" } }, { "uri": "/2021/08/05/dol-enforcement-of-plan-cybersecurity-guidance-warrants-plan-sponsor-action/", "title": "DOL enforcement of plan cybersecurity guidance warrants plan sponsor action", "summary": "Plan sponsors and fiduciaries should be aware that the DOL cybersecurity guidance likely applies to all plans governed by ERISA, not just retirement plans.", "byline": "Hannah Munn", "kicker": "Commentary", "tags": [], "prettyDate": "August 05, 2021", "wordcount": "494", "timeToRead": "3 minute", "readtime": "3", "authors": [ { "webUrl": "/author/profile/hannah-munn/", "name": "Hannah Munn" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/08/security-cyber-lock-tech.jpg", "width": "610", "height": "410" } }, { "uri": "/2021/10/07/employees-working-from-home-tips-to-reduce-cyber-risk/", "title": "Employees working from home? Tips to reduce cyber-risk", "summary": "This article provides some eye-opening observations about cyberattacks, practical tips to help avoid becoming a victim and advice on what to do if something happens.", "byline": "Dennis Healy", "kicker": "", "tags": [], "prettyDate": "October 07, 2021", "wordcount": "1380", "timeToRead": "7 minute", "readtime": "7", "authors": [ { "webUrl": "/author/profile/dennis-healy/", "name": "Dennis Healy" } ], "kickerNode": [], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/10/AdobeStock_239075161.jpg", "width": "750", "height": "500" } }, { "uri": "/2021/10/04/infographic-cyber-threats-in-the-new-world-of-work/", "title": "Infographic: Cyber threats in the new world of work", "summary": "With more work being done remotely, the risk of a cyber attack has increased exponentially.", "byline": "Emily Payne", "kicker": "Infographic", "tags": [], "prettyDate": "October 04, 2021", "wordcount": "324", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/emily-payne/", "name": "Emily Payne" } ], "kickerNode": [ { "uri": "/infographic/", "sectionName": "Infographic" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/01/Data-security-Article-202101071419.jpg", "width": "620", "height": "372" } }, { "uri": "/2020/08/11/prepare-today-for-the-crisis-of-tomorrow-412-102098/", "title": "6 steps to take today to prepare for the crisis of tomorrow", "summary": "A step-by-step guide to business continuity and crisis communication planning.", "byline": "Nate Reznicek", "kicker": "Commentary", "tags": [ "canonical:https://www.treasuryandrisk.com/2020/06/23/prepare-today-for-the-crisis-of-tomorrow" ], "prettyDate": "August 11, 2020", "wordcount": "1557", "timeToRead": "8 minute", "readtime": "8", "authors": [ { "webUrl": "/author/profile/nate-reznicek/", "name": "Nate Reznicek" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/06/2020-06-23-Falling-dominoes_616x372.png", "width": "616", "height": "373" } }, { "uri": "/2018/02/16/securing-company-email-content-a-checklist/", "title": "Securing company email content: a checklist", "summary": "In every organization, individual employees are the weakest link when it comes to email security. Remote working, which is coming more ubiquitous and appealing, makes the use of unsecured email even more likely.", "byline": "Idan Udi Edry", "kicker": "", "tags": [], "prettyDate": "February 16, 2018", "wordcount": "732", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/idan-udi-edry/", "name": "Idan Udi Edry" } ], "kickerNode": [], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "", "width": "", "height": "" } }, { "uri": "/2021/12/13/employees-are-the-first-line-of-cyber-defense-412-124841/", "title": "Employees are the first line of cyber defense", "summary": "Only 18% of SMBs are confident their organization is prepared for a cyber incident.", "byline": "Kara Hoogensen and Karen Evans", "kicker": "Commentary", "tags": [ "canonical:https://www.propertycasualty360.com/2021/12/09/employees-are-the-first-line-of-cyber-defense" ], "prettyDate": "December 13, 2021", "wordcount": "830", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/kara-hoogensen/", "name": "Kara Hoogensen" }, { "webUrl": "/author/profile/karen-evans/", "name": "Karen Evans" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/12/Cybersecurity-Plan-Article-202112081845.jpg", "width": "620", "height": "372" } }, { "uri": "/2016/08/31/hr-do-this-to-protect-yourself-from-ransomware-attacks/", "title": "HR: Do this to protect yourself from ransomware attacks", "summary": "According to one expert, \"HR is the perfect world for ransomware. It infects one device and 30 others get infected. Here is what he says HR departments should do to protect themselves.", "byline": "Dan Cook", "kicker": "", "tags": [], "prettyDate": "August 31, 2016", "wordcount": "341", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/dan-cook/", "name": "Dan Cook" } ], "kickerNode": [], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "", "width": "", "height": "" } }, { "uri": "/2021/03/17/infographic-what-cyberattacks-are-being-used-against-retirement-plans/", "title": "Infographic: What cyberattacks are being used against retirement plans?", "summary": "Government watchdog slams DOL for not providing necessary guidance about cybersecurity and fiduciary duty, lists types of cyber attacks against retirement plans.", "byline": "C.J. Marwitz, editor, BenefitsPRO", "kicker": "News", "tags": [], "prettyDate": "March 17, 2021", "wordcount": "291", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/cj-marwitz-editor-benefitspro/", "name": "C.J. Marwitz, editor, BenefitsPRO" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/03/tech-hack-cyber-security.jpg", "width": "616", "height": "411" } }, { "uri": "/2021/04/21/quick-dive-into-dols-new-guidance-for-retirement-plan-cybersecurity/", "title": "Quick dive into DOL's new guidance for retirement plan cybersecurity", "summary": "Includes 12 best practices for recordkeepers regarding plan-related IT systems and data, and for plan fiduciaries making decisions about hiring them.", "byline": "Kristen Beckman", "kicker": "News", "tags": [], "prettyDate": "April 21, 2021", "wordcount": "730", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/kristen-beckman/", "name": "Kristen Beckman" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/04/cyber-security-technology.jpg", "width": "616", "height": "411" } }, { "uri": "/2021/12/23/greater-risk-than-volatility-412-125260/", "title": "There's a greater risk than market volatility for advisors", "summary": "Here are steps you can take to help protect your clients' data from 3 big risks facing financial services firms.", "byline": "Manuel Balderas", "kicker": "Commentary", "tags": [ "canonical:https://www.thinkadvisor.com/2021/12/15/3-steps-to-a-safer-ria" ], "prettyDate": "December 23, 2021", "wordcount": "990", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/manuel-balderas/", "name": "Manuel Balderas" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/12/hand-smartphone-cyber-security-fraud-hack-tech.jpg", "width": "618", "height": "410" } }, { "uri": "/2021/09/27/why-cybercriminals-are-attacking-412-121740/", "title": "Why cybercriminals are attacking small businesses (and how they do it)", "summary": "Experts reveal how and why these businesses are targeted and ways to mitigate these risks.", "byline": "Steve Hallo", "kicker": "Q&A", "tags": [ "canonical:https://www.propertycasualty360.com/2021/09/27/how-why-small-businesses-are-targeted-by-cybercriminals" ], "prettyDate": "September 27, 2021", "wordcount": "909", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/steve-hallo/", "name": "Steve Hallo" } ], "kickerNode": [ { "uri": "/q-and-a/", "sectionName": "Q&A" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/09/Businesswoman-drawing-The-big-fish-eats-the-small-fish-on-chalkboard-Article-202109241401.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/01/13/ransomware-threats-to-the-insurance-industry-and-how-to-stop-them/", "title": "Ransomware threats to the insurance industry and how to stop them", "summary": "Besides the risk of exposing customer data, as well as incurring regulatory repercussions, ransom payouts have hit in the tens of millions of dollars.", "byline": "Justice Levine", "kicker": "Commentary", "tags": [], "prettyDate": "January 13, 2022", "wordcount": "896", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/justice-levine/", "name": "Justice Levine" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2022/01/Ransomware-attack-rawf8_Shutterstock_Falcon-ransom-cyber.jpg", "width": "616", "height": "372" } }, { "uri": "/2017/08/25/18-emerging-risks-for-the-insurance-industry-its-customers-and-society/", "title": "18 emerging risks for the insurance industry, its customers and society", "summary": "Insights into emerging risks and how they can best be tackled.", "byline": "Jayleen R. Heft", "kicker": "", "tags": [], "prettyDate": "August 25, 2017", "wordcount": "4162", "timeToRead": "21 minute", "readtime": "21", "authors": [ { "webUrl": "/author/profile/jayleen-r-heft/", "name": "Jayleen R. Heft" } ], "kickerNode": [], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "", "width": "", "height": "" } }, { "uri": "/2020/08/03/benefit-plans-and-cybercrime-in-the-post-pandemic-world/", "title": "Benefit plans and cybercrime in the post-pandemic world", "summary": "4 things plan sponsors and administrators can do to mitigate and shift security risks due to cyber thieves.", "byline": "Robert Projansky", "kicker": "Commentary", "tags": [], "prettyDate": "August 03, 2020", "wordcount": "1526", "timeToRead": "8 minute", "readtime": "8", "authors": [ { "webUrl": "/author/profile/robert-projansky/", "name": "Robert Projansky" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/07/cyber-security-technology.jpg", "width": "616", "height": "411" } }, { "uri": "/2021/03/08/how-safe-is-your-employee-benefits-data/", "title": "How safe is your employee benefits data?", "summary": "Benefits-related employee data may be more vulnerable than ever thanks to COVID-19. Here's what to know to protect your employees and your company.", "byline": "Kristen Beckman", "kicker": "Analysis", "tags": [], "prettyDate": "March 08, 2021", "wordcount": "924", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/kristen-beckman/", "name": "Kristen Beckman" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/03/cybersecurity-cyber-security-hacker-tech.jpg", "width": "616", "height": "411" } }, { "uri": "/2020/06/10/business-continuity-plans-the-new-preparedness-for-the-new-normal/", "title": "Business continuity plans: The new preparedness for the new normal", "summary": "Resilence comes with planning.", "byline": "C.J. Marwitz, editor, BenefitsPRO", "kicker": "Analysis", "tags": [], "prettyDate": "June 10, 2020", "wordcount": "1170", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/cj-marwitz-editor-benefitspro/", "name": "C.J. Marwitz, editor, BenefitsPRO" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/06/covid-19-coronavirus-business-small-layoff.jpg", "width": "617", "height": "410" } }, { "uri": "/2021/07/09/lawyers-say-every-business-should-buy-cybersecurity-insurance-412-118395/", "title": "First the attack, then the lawsuits: Why every business should have cybersecurity insurance", "summary": "Lawyers say that any type of business that collects customer or employee data should consider buying this insurance.", "byline": "Angela Morris", "kicker": "Best Practices", "tags": [ "canonical:https://www.law.com/texaslawyer/2021/07/08/with-looming-attack-and-litigation-risk-lawyers-say-every-business-should-buy-cybersecurity-insurance" ], "prettyDate": "July 09, 2021", "wordcount": "849", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/angela-morris/", "name": "Angela Morris" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/07/cyber-hacker-technology.jpg", "width": "619", "height": "411" } }, { "uri": "/2022/01/19/cyberattacks-lead-to-increased-scrutiny-how-can-companies-stay-ahead-of-the-curve/", "title": "Cyber insurance is changing -- now is the time to review your coverage and processes", "summary": "The landscape of standalone cyber policies is changing, and companies must review their existing or proposed cyber coverages carefully.", "byline": "Walter Andrews, Andrea DeField and Sima Kazmir", "kicker": "Commentary", "tags": [ "canonical:https://www.propertycasualty360.com/2022/01/18/cyberattacks-lead-to-increased-scrutiny-how-can-companies-stay-ahead-of-the-curve-414-216174" ], "prettyDate": "January 19, 2022", "wordcount": "1158", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/walter-andrews-andrea-defield/", "name": "Walter Andrews, Andrea DeField" }, { "webUrl": "/author/profile/sima-kazmir/", "name": "Sima Kazmir" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2022/01/cyber-insurance-Article-202201171846.jpg", "width": "620", "height": "372" } }, { "uri": "/2022/02/11/5th-circuit-rules-in-multi-million-dollar-phishing-case/", "title": "Court sides with insurer in phishing attack case", "summary": "Coverage was initially denied because the plaintiff never \"held\" the funds.", "byline": "Hannah Smith JD", "kicker": "Analysis", "tags": [ "canonical:https://www.propertycasualty360.com/2022/02/03/5th-circuit-rules-in-multi-million-dollar-phishing-case-414-217082" ], "prettyDate": "February 11, 2022", "wordcount": "471", "timeToRead": "3 minute", "readtime": "3", "authors": [ { "webUrl": "/author/profile/hannah-smith-jd/", "name": "Hannah Smith JD" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2022/02/Phishing-MAIN.jpg", "width": "620", "height": "372" } }, { "uri": "/2021/05/21/financial-services-industrys-5-biggest-risks-allianz/", "title": "5 biggest risks for financial services: Allianz", "summary": "Cyber risks and COVID-19 impacts top the list of risks the financial services industry faces in the coming months, but three more risks are just as significant.", "byline": "Kristen Beckman", "kicker": "News", "tags": [], "prettyDate": "May 21, 2021", "wordcount": "0", "timeToRead": "0 minute", "readtime": "0", "authors": [ { "webUrl": "/author/profile/kristen-beckman/", "name": "Kristen Beckman" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/05/risk-trap-sponsor-man.jpg", "width": "617", "height": "411" } }, { "uri": "/2020/10/14/401k-plan-hacked-plan-sponsors-cant-always-blame-the-recordkeeper/", "title": "401(k) plan hacked? Plan sponsors can't always blame the recordkeeper", "summary": "Employers do have some level of responsibility for cybersecurity, despite a recent court ruling to the contrary. But there are steps they can take to avoid such risk in the first place.", "byline": "David Weldon", "kicker": "Analysis", "tags": [], "prettyDate": "October 14, 2020", "wordcount": "1328", "timeToRead": "7 minute", "readtime": "7", "authors": [ { "webUrl": "/author/profile/david-weldon/", "name": "David Weldon" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/10/hand-smartphone-cyber-security-fraud-hack-tech.jpg", "width": "618", "height": "410" } }, { "uri": "/2021/03/15/how-plan-sponsors-can-help-plan-participants-protect-their-retirement-savings/", "title": "How plan sponsors can help plan participants protect their retirement savings", "summary": "Consider the whole picture of participants' financial landscape to build a solid line of defense around their retirement savings.", "byline": "Paul Swanson", "kicker": "Commentary", "tags": [], "prettyDate": "March 15, 2021", "wordcount": "951", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/paul-swanson/", "name": "Paul Swanson" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/03/hands-business-people-protecting-fiduciary.jpg", "width": "617", "height": "411" } }, { "uri": "/2021/09/07/5-ways-plan-sponsors-can-boost-cybersecurity-with-retirement-planning/", "title": "5 ways plan sponsors can boost cybersecurity with retirement planning", "summary": "Here are 5 tips plan sponsors can keep top of mind as they determine if their current cybersecurity practices need improvement.", "byline": "Todd Klaben", "kicker": "Commentary", "tags": [], "prettyDate": "September 07, 2021", "wordcount": "762", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/todd-klaben/", "name": "Todd Klaben" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/09/committee-experts-sponsor.jpg", "width": "617", "height": "404" } }, { "uri": "/2018/01/31/why-csirts-are-crucial-to-cybersecurity-in-the-financial-industry/", "title": "Why CSIRTS are crucial to cybersecurity in the financial industry", "summary": "Does your retirement plan provider, advisor, or recordkeeper have a Computer Security Incident Response Team? With cybersecurity threats everywhere, CSIRTs play an indispensable role in the retirement industry.", "byline": "Mike Goode", "kicker": "", "tags": [], "prettyDate": "January 31, 2018", "wordcount": "770", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/mike-goode/", "name": "Mike Goode" } ], "kickerNode": [], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "", "width": "", "height": "" } }, { "uri": "/2020/10/28/5-steps-to-recovering-from-a-ransomware-attack-412-106117/", "title": "5 steps to recovering from a ransomware attack", "summary": "Ransomware attacks have grown in frequency and severity this year with an average cost of $4.4 million.", "byline": "Stu Sjouwerman", "kicker": "Commentary", "tags": [ "canonical:https://www.propertycasualty360.com/2020/10/20/5-steps-to-recovering-from-a-ransomware-attack" ], "prettyDate": "October 28, 2020", "wordcount": "1018", "timeToRead": "6 minute", "readtime": "6", "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/10/Ransomware-attack-rawf8_Shutterstock_Falcon-ransom-cyber.jpg", "width": "616", "height": "372" } }, { "uri": "/2021/05/05/ransomware-incidents-costs-on-the-rise-and-no-target-is-too-small/", "title": "Ransomware incidents, costs on the rise, and no target is too small", "summary": "Resource-stretched small businesses are ripe for exploitation, unfortunately.", "byline": "Danielle Andrus and C.J. Marwitz", "kicker": "News", "tags": [], "prettyDate": "May 05, 2021", "wordcount": "211", "timeToRead": "2 minute", "readtime": "2", "authors": [ { "webUrl": "/author/profile/danielle-andrus/", "name": "Danielle Andrus" }, { "webUrl": "/author/profile/cj-marwitz/", "name": "C.J. Marwitz" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/05/ransomware-tech-cyber-hack.jpg", "width": "616", "height": "372" } }, { "uri": "/2021/09/23/facilitating-ransomware-payments-412-121628/", "title": "'Facilitating' ransomware payments could land companies in hot water", "summary": "An updated Treasury Department advisory spells out the risks cyber insurers and other companies could face for paying ransoms.", "byline": "Steve Hallo", "kicker": "News", "tags": [ "canonical:https://www.propertycasualty360.com/2021/09/23/penalties-are-possible-for-facilitating-ransomware-payments" ], "prettyDate": "September 23, 2021", "wordcount": "476", "timeToRead": "3 minute", "readtime": "3", "authors": [ { "webUrl": "/author/profile/steve-hallo/", "name": "Steve Hallo" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/09/Ransomware-Article-202109221547.jpg", "width": "620", "height": "372" } }, { "uri": "/2020/01/09/southwire-sues-anonymous-hacker-for-ransomware-attack-412-92121/", "title": "Can you sue an anonymous hacker for a ransomware attack? This company is.", "summary": "The hacker allegedly not only released private information but set up a public website listing 27 other companies that refused to pay the ransom.", "byline": "R. Robin McDonald", "kicker": "News", "tags": [ "canonical:https://www.law.com/dailyreportonline/2020/01/02/southwire-sues-anonymous-hacker-for-ransomware-attack" ], "prettyDate": "January 09, 2020", "wordcount": "686", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/r-robin-mcdonald/", "name": "R. Robin McDonald" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/01/cyber-hacker-technology.jpg", "width": "619", "height": "411" } }, { "uri": "/2021/07/30/small-breaches-can-be-most-harmful-412-119401/", "title": "Data breaches: Surprisingly, smaller ones can be the most harmful", "summary": "The breaches causing the most harm to victims are taking place at smaller, lesser-known enterprises.", "byline": "Natasha Chilingerian", "kicker": "News", "tags": [ "canonical:https://www.cutimes.com/2021/07/22/small-breaches-leading-to-big-consequences-sontiq-report" ], "prettyDate": "July 30, 2021", "wordcount": "602", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/natasha-chilingerian/", "name": "Natasha Chilingerian" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2021/07/data-breach-board-e1532441832134.jpg", "width": "620", "height": "414" } }, { "uri": "/2019/03/04/employees-emails-file-sharing-are-data-breach-trojan-horses-survey-412-78602/", "title": "Employee emails, and other common causes of data breaches", "summary": "Employees' emailing and file sharing practices are the leading cause of accidental data breaches, according to a new survey.", "byline": "Victoria Hudgins", "kicker": "Analysis", "tags": [ "canonical:https://www.law.com/legaltechnews/sites/legaltechnews/2019/02/26/employees-emails-file-sharing-are-data-breach-trojan-horses-survey/" ], "prettyDate": "March 04, 2019", "wordcount": "718", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/victoria-hudgins/", "name": "Victoria Hudgins" } ], "kickerNode": [ { "uri": "/analysis/", "sectionName": "Analysis" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2019/02/email-in-trash-Article-201902011900.jpg", "width": "620", "height": "372" } }, { "uri": "/2021/04/08/improving-cybersecurity-for-remote-and-hybrid-workforces/", "title": "Improving cybersecurity for remote and hybrid workforces", "summary": "The shift to remote work has been a seismic event for HR professionals, but it has also had a significant impact on the IT department.", "byline": "Chad Carter", "kicker": "Best Practices", "tags": [], "prettyDate": "April 08, 2021", "wordcount": "900", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/chad-carter/", "name": "Chad Carter" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/07/cyber-security-technology.jpg", "width": "616", "height": "411" } }, { "uri": "/2020/05/13/covid-19-password-hygiene-gains-importance-as-workers-access-systems-from-home/", "title": "COVID-19 password 'hygiene' gains importance as workers access systems from home", "summary": "It's not that workers are clueless about cybersecurity -- they just know they will forget their passwords.", "byline": "C.J. Marwitz, editor, BenefitsPRO", "kicker": "News", "tags": [], "prettyDate": "May 13, 2020", "wordcount": "864", "timeToRead": "5 minute", "readtime": "5", "authors": [ { "webUrl": "/author/profile/cj-marwitz-editor-benefitspro/", "name": "C.J. Marwitz, editor, BenefitsPRO" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2020/05/shutterstock_190616819-password-cyber-security.jpg", "width": "700", "height": "491" } }, { "uri": "/2019/12/23/cybersecurity-a-bore-not-when-you-get-hacked-412-91364/", "title": "Cybersecurity a bore? Not when you get hacked", "summary": "Fraudsters now use \"social engineering\" to tailor attacks. Make sure you and your clients are educated on what to look for.", "byline": "Dan Skiles", "kicker": "Commentary", "tags": [ "canonical:https://www.thinkadvisor.com/2019/12/13/cybersecurity-a-bore-not-when-you-get-hacked" ], "prettyDate": "December 23, 2019", "wordcount": "728", "timeToRead": "4 minute", "readtime": "4", "authors": [ { "webUrl": "/author/profile/dan-skiles/", "name": "Dan Skiles" } ], "kickerNode": [ { "uri": "/commentary/", "sectionName": "Commentary" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2019/12/Cybersecurity-Ivelin-Radkov-Shutterstock-MI.jpg", "width": "600", "height": "338" } }, { "uri": "/2019/05/16/report-executives-likely-to-be-targeted-for-cybercrime-412-82401/", "title": "Report: Executives likely to be targeted for cybercrime", "summary": "In addition, human resource departments are six times less likely to be targeted for an attack.", "byline": "Dan Clark", "kicker": "News", "tags": [ "canonical:https://www.law.com/corpcounsel/2019/05/13/report-executives-likely-to-be-targeted-for-cybercrime/" ], "prettyDate": "May 16, 2019", "wordcount": "552", "timeToRead": "3 minute", "readtime": "3", "authors": [ { "webUrl": "/author/profile/dan-clark/", "name": "Dan Clark" } ], "kickerNode": [ { "uri": "/news/", "sectionName": "News" } ], "primaryCategory": { "channelName": "", "sectionName": "", "uri": "" }, "image": { "uri": "https://images.benefitspro.com/contrib/content/uploads/sites/412/2019/03/01-cyber-insurance-istock.jpg", "width": "620", "height": "372" } } ], "navigations": [], "sponsors": [] } }