Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

How Does Ransomware Spread?

how_does_ransomware_spread_hero_image

Next in our series on ransomware is more information about how ransomware spreads. This article is part of our Definitive Guide to Ransomware series: Ransomware is malware that encrypts data or locks you out of your system, and demands a ransom or payment in order to regain access to your files or device. But how does ransomware […]

How to Report Ransomware [Complete Guide]

how_to_report_ransomware_hero_image

Ransomware was responsible for more than $7.5 billion in damages in the United States in 2019 alone. Attacks are so common, hackers attack a business or an individual online every 39 seconds, over 2,000 times per day. It’s likely someone in your organization will fall victim to a common ransomware attack method. What happens when your network is […]

Measured Insurance and Advisen Announce New Data Partnership

data_partnership_hero_image

SALT LAKE CITY, Utah, May 12, 2020 / — Measured Insurance, a ransomware focused MGA, is bridging the gap between technology and insurance, using analytics that track clients’ cyber risk exposure in real time. Their mission is to create smarter insurance products focused on the hyper-proliferation of Ransomware. Today Measured announced a partnership with Advisen to […]

What You Need to Know About Ransomware Insurance

ransomware_insurance_hero_image

Quickly now – how much cyber insurance does your company need? It’s a question that many organizations struggle to answer. Sizing up the inherent exposure to loss (or risk) a business faces is a non-trivial task. It is, however, an important one–and without a reliable methodology for sizing risk, and comparing it against other opportunities, […]

Common Ransomware Attacks

common_ransomware_attacks_hero_image

Ransomware attacks are becoming more and more common, but there are three key tactics crime actors employ to attack your network and systems. In this article we’ll cover three common ransomware attacks and the best practices to follow to prevent each one. This article is part of our Definitive Guide to Ransomware series: EXAMPLES OF RANSOMWARE ATTACKS […]