What to Expect When Applying for Cyberinsurance

, Legaltech News


Data breaches and network intrusions are front page news, and businesses should take a "when, not if" approach to these threats and treat data security as one of their most important business risks.

This content has been archived. It is available exclusively through our partner LexisNexis®.

To view this content, please continue to Lexis Advance®.

Continue to Lexis Advance®

Not a Lexis Advance® Subscriber? Subscribe Now

Why am I seeing this?

LexisNexis® is now the exclusive third party online distributor of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® customers will be able to access and use ALM's content by subscribing to the LexisNexis® services via Lexis Advance®. This includes content from the National Law Journal®, The American Lawyer®, Law Technology News®, The New York Law Journal® and Corporate Counsel®, as well as ALM's other newspapers, directories, legal treatises, published and unpublished court opinions, and other sources of legal information.

ALM's content plays a significant role in your work and research, and now through this alliance LexisNexis® will bring you access to an even more comprehensive collection of legal content.

For questions call 1-877-256-2472 or contact us at customercare@alm.com

What's being said

  • Computer Security Guy

    The article, like many, focuses on the external threat to systems. While the majority of inicidents are caused by external attacks, the vast majority of records stolen are from internal hacks. In addition to background checks, the systems themselves must be subject to professional external reviews to assure they are properly maintained and have the proper security installed both for the Operating System and the Applications. Additionally, a review should be done to assure that access to sensitive information is limilted to those with a real need and that there are no copies of this sensitive information floating around which could more easily be stolen by an insider.

Comments are not moderated. To report offensive comments, click here.

Preparing comment abuse report for Article #1361437923602

Thank you!

This article's comments will be reviewed.