Knowledge Center

Image

September 03, 2024

No One Is Immune: The Critical Importance of Cybersecurity and Vendor Management

In today's digital landscape, the interconnectedness of systems and the reliance on IT and cybersecurity vendors have created an environment where no organization is truly immune to potential disrupti...

Image

April 23, 2024

Mastering Wire Transfer Security: Best Practices for Protecting Your Organization

In today's digital landscape, electronic payments, such as wire transfers, offer organizations enhanced efficiency and security. However, with these benefits come inherent risks, particularly the thre...

Image

February 21, 2023

2023 Cyber Market Update

As the cyber insurance market continues to change and evolve, looking at trends and influences happening in 2023 can help businesses better assess how to address ongoing risk, and plan accordingly. O...

Image

December 20, 2022

Are Cyber Captives Right for Your Business?

Most organizations today face exposure to cyber and technology threats as they continue to expand, grow and operate. Data privacy and security breaches, business interruption expenses, investigative a...

Image

November 25, 2022

Holiday Safe Shopping 2022

While the Holidays are known as the “Season of Giving Gifts,” this time of year is quickly also becoming known as the “Season of Giving Away Personal Information.” Cyber crimi...

Image

October 07, 2022

Protect Your Business from Wire Transfer Fraud

Wire Transfer Fraud continues to be a real threat for many organizations who receive invoices from threat actors that look legitimate. Don’t get caught. With some advance planning and key securi...

Image

March 23, 2022

Data Extortion Hacking Group "Lapsus$" Compromises Several High Level Organizations

Over the weekend, it was reported that Lapsus$, the data extortion hacking group, had maliciously compromised many high-profile organizations. In the last few months, Lapsus$ has been breaking into a ...

Image

March 10, 2022

The Russia-Ukraine War and its Cyber Security Threat Implications

The events currently occurring in Ukraine are devastating. Whether you are a descendant of Ukraine or Russia, or have friends, family, neighbors, or colleagues impacted, our hearts go out to you. At G...

Image

January 24, 2022

Cyber Insurance Protection for 2022

In an ever-expanding world with a fast-changing and complicated insurance coverage landscape, cyber threats inevitably present themselves to any organization with even the most sophisticated environme...

Image

November 10, 2021

Webinar Recap: Cyber Attack and How to Fight Back

With cyberattacks continuing to grow in prevalence, impact and sophistication, Graham Company held a webinar last month titled “Cyber Attack and How to Fight Back”. The goal was to provide...

Image

July 01, 2021

A New Era for Cybercriminals: Easy access to inexpensive, large scale computing solutions driving increased cyber liability risk

Advances in shared computing infrastructure like cloud computing and the overall commoditization of computing, storage, and networking tools have created a boon for small organizations and start-ups t...

Image

January 16, 2019

The State of Insurance in 2019

The new year is upon us, and although what the next 12 months will hold is uncertain, it is part of our job to stay ahead of industry trends. We forecast the following trends will have an im...

Image

April 18, 2018

Volume X, Issue 1: Q1 2018

In this issue, Graham Company announces our refreshed branding and new website. Carl Bloomfield and Bette McNee also discuss the important difference between employee satisfaction and employee engagem...

Image

April 17, 2018

Cyber & Construction: Understanding Your Risks

From last year’s Equifax breach to the highly publicized WannaCry and NoPetya attacks, cyber incidents have quickly become one of the top risks facing companies across almost every vertical. ...

Image

April 10, 2018

Ask The Expert: Cyber Risks During Mergers & Acquisitions

Why are cyber risks heightened during mergers & acquisitions (M&A)? There will always be heightened risk when two organizations’ information security programs merge, because the lik...

Manage Cookies