Our Blog - Surety Matters

Our blog covering the latest in bonds and insurance
Displaying 203 results for: Breach
Cyber for Plan Sponsors 05.29.2019

Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks

Your company computer may have an anti-virus program installed on it, but if you think that’s enough to prevent your retirement plan from succumbing to cyber attacks and data breaches, you have another thing coming….
Read Moreabout Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks

Anti-Virus Software Will Not Protect Your Plan From Cyber Attacks
Cyber for Plan Sponsors 05.29.2019

DOL: Plan Sponsors Must Protect Electronic Plan Information

ERISA does not specifically lay out rules and regulations regarding protecting plan data, but the U.S. Department of Labor has addressed the vulnerability of electronically sent plan information. In Regulation Section 2520.104b-1(c), the DOL stated that…
Read Moreabout DOL: Plan Sponsors Must Protect Electronic Plan Information

DOL: Plan Sponsors Must Protect Electronic Plan Information
Cyber for Plan Sponsors 05.29.2019

Survey: 83% of Organizations Have Had a Data Breach

According to a survey of over 1,000 United States companies conducted by Opinion Matters, 83% of surveyed companies have experienced some sort of accidental data breach. More exposure occurred through employees accidentally exposing data through…
Read Moreabout Survey: 83% of Organizations Have Had a Data Breach

Survey: 83% of Organizations Have Had a Data Breach
Cyber for Plan Sponsors 05.29.2019

Cybersecurity and Retirement Plans: Unanswered Questions

With cyber attacks and data breaches becoming more and more commonplace, it’s become fair to ask where cybersecurity fits within the duties and responsibilities of retirement plan fiduciaries and participants Congress has started asking the…
Read Moreabout Cybersecurity and Retirement Plans: Unanswered Questions

Cybersecurity and Retirement Plans: Unanswered Questions
Cyber for Plan Sponsors 05.29.2019

Average Time Taken to Identify and Contain a Data Breach

According to a survey by the Ponemon Institute of 477 companies that experienced a data breach in 2018, the average number of days to even identify a data breach could be as high as 221…
Read Moreabout Average Time Taken to Identify and Contain a Data Breach

Average Time Taken to Identify and Contain a Data Breach
Cyber for Plan Sponsors 05.29.2019

Financial Markets More Vulnerable to Cyber Attacks

According to a new report from SWIFT and BAE Systems, financial markets are becoming more and more vulnerable to cyber attack and data breaches. With so many participants and points of entry, the report states that…
Read Moreabout Financial Markets More Vulnerable to Cyber Attacks

Financial Markets More Vulnerable to Cyber Attacks
Cyber for Plan Sponsors 05.29.2019

The Sony Hack Shows How Vulnerable Your Retirement Plan Is

Sony is one of the largest companies in the world. Its products include everything from movies to cameras to financial services. Its 2014 hack should show you that even if their information is vulnerable to cyber…
Read Moreabout The Sony Hack Shows How Vulnerable Your Retirement Plan Is

The Sony Hack Shows How Vulnerable Your Retirement Plan Is
Cyber for Plan Sponsors 05.29.2019

Quick Data Breach Response Time Can Save Your Company

Not only is the number of data breaches increasing every day, but the speed with which customers find out about them is increasing as well. Word is spreading on social media and through online articles…
Read Moreabout Quick Data Breach Response Time Can Save Your Company

Quick Data Breach Response Time Can Save Your Company
Cyber for Plan Sponsors 05.29.2019

Identity Theft Protection Isn’t Enough Against Cyber Attacks

For years, the biggest fraudulent internet schemes you had to worry about involved identity theft, whether it be a Nigerian Prince requiring your personal info to receive a portion of his wealth or just someone…
Read Moreabout Identity Theft Protection Isn’t Enough Against Cyber Attacks

Identity Theft Protection Isn’t Enough Against Cyber Attacks