Measured Insurance Partners with Canopius and Long-time Backer SCOR to Expand Critical Cyber Insurance Solutions

Ransomware Examples: 50 Noteworthy Examples of Ransomware Attacks

encrypts_files_hero_image

Is your company protected from ransomware? Ransomware is a type of malware that infiltrates your network and encrypts important files. It can get in through email attachments, malicious links, and even vulnerabilities in your network security. Unlike other cyber attacks, ransomware holds your information hostage while attackers demand a fee for restoring access to your […]

Recent Ransomware Attacks & Examples

ransom_examples_hero_image

Ransomware is a growing threat across all industries. Understanding how ransomware has impacted companies around the world will help you understand your risk. In this post we’ll cover recent ransomware attacks and examples. This article is part of our Definitive Guide to Ransomware series: The Rise of Ransomware Ransomware has been a threat to businesses […]

Ransomware Removal

darkside_ransomware_group_hero_image

Google the phrase “How do I remove ransomware” and you’ll be greeted by hundreds of ads with promises that, for only a few hundred dollars, the ransomware attack you’re currently experiencing will be nothing more than a sad memory in only a few short hours. The truth about ransomware removal can be a little more […]

The Right Way to Do Cybersecurity Insurance

admitted_insurer_hero_image

Corporation’s cyber risk is growing larger every day. While more and more companies are allocating additional resources and capital to mitigating cyber threats, they’re discovering along the way that they don’t know the size of their own risk. Sizing your exposure to cyber risk, independent of any single threat, can be a daunting task. It is […]

Cost of Ransomware Attacks

clock_hero_image

There’s no way around it. Ransomware exposure needs to consider all the costs of a breach – from the ransom payment, to costs of IT recovery and remediation as well as legal, regulatory and customer communications. Companies must understand this risk before they get breached. A mature cyber risk management approach will calculate the amount of loss possible in a potential […]