Posts by James (Jim) Napp

Author Blog Post Archive

  1. COVID-19: 5 Cybersecurity Risks You Need to Consider

    Remember when we said that cybersecurity risks are important to pay attention to? Well, now is the time to listen. As you are probably reading this from your basement, kitchen table, or makeshift office, I don’t need to tell you that COVID-19 has changed the way we work literally overnight. Not only do many of […]

  2. Cybersecurity Risk Management Plans and Workplace Safety Part 2

    As mentioned in the first installment of this blog series, cyber risk management has become a mission-critical activity for a long-term viability of any organization, which should be driven by leadership and involve all technology users. But often, building and implementing a cybersecurity risk management plan is quite challenging for non-technical executives. To help, in […]

  3. Cybersecurity Risk Management Plans and Workplace Safety

    If you’ve experienced a cyber event or data breach, or you understand how easy it is for one to occur, then you know the mission-critical importance of cybersecurity risk management plans. However, unlike traditional risk management — for things like employee safety culture or physical security — cyber risk management has only recently started to […]

  4. 5 Ways Cyber Insurance Can Help Your Physician’s Practice Manage Cyber Risk

    Did you know? To date, in 2017 there have been 133 reported data breaches in the healthcare industry – on average 17,849 records breached per incident. The Ponemon Institute estimates the cost per lost or stolen healthcare record to be about $400. This does not include fines and penalties, which can further increase the cost. […]

  5. Are you protected from technology related losses? Your Commercial General Liability is no longer enough

    Commercial General Liability (CGL) insurance used to be sufficient to protect a business from most major potential claims and lawsuits. Today, with the prevalent use of technology and electronic information, it is no longer the case. In this post, I analyze a court decision concerning a physical loss of IBM’s electronic data to demonstrate why […]