- Evidentiary Issues
- Statutes of Limitation
- Coverage Issues
- Subrogation & Liens
- Claims Handling
When a computer security breach occurs how should it be handled with customers and clients? Is there immediate public disclosure, or is there first a careful investigation and scrutiny of what occurred and what data was compromised? The proper strategy must be developed preemptively along with related training to instruct employees how to handle the issue. The most forward thinking businesses go a step further and conduct training simulations with employees to simulate cyber attacks and data security breaches.
Read More: Cyber Security Part 2
This article is the second installment of a 3-part series on cyber security.
Read Part 1 here.
In 2015 alone, cyber experts indicate that losses due to cyber crime exceeded $400 billion dollars worldwide. Attacks were not limited to the huge retailers, medical providers, financial groups or shipping ports; in fact many hackers don’t know the company they have breached until after they have gained access. Anyone who has records of personal information is subject to risk.
Read More: Cyber Security Part 1