Simulated cyberattack on a laptop. (Photo: Billion Photos/Shutterstock.com)

In a world where so many businesses are reliant on technology to power operations, those businesses are also at risk of that technology becoming prey to hackers and cyber thieves. Not a day goes by without another mainstream headline about the latest security breach.

Google "cybersecurity breach" and you'll see about 31,100,000 results. Tap the "News" link at the top of your search results and you'll see the latest news about the many cybersecurity breaches around the world.

Complete your profile to continue reading and get FREE access to BenefitsPRO, part of your ALM digital membership.

Your access to unlimited BenefitsPRO content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking benefits news and analysis, on-site and via our newsletters and custom alerts
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the property casualty insurance and financial advisory markets on our other ALM sites, PropertyCasualty360 and ThinkAdvisor
NOT FOR REPRINT

© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.