What is covered under "cyber extortion" within a cyber liability policy?

July 27, 2018
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
Previous Article
How to dispose of storage devices containing PHI and other sensitive data
How to dispose of storage devices containing PHI and other sensitive data

Improper disposal of electronic devices and media puts the information stored on those devices at risk for ...

Next Flipbook
Reporter Quarter 2 2018
Reporter Quarter 2 2018

Risk management trends analysis; Preparing for office based medical emergencies (CME); How to prepare for a...

CME Seminar: BETTER COMMUNICATION THROUGH IMPROV

Register Now