Click to toggle navigation menu.

Category: Cyber Threats & Incident Analysis

Business Interruption Is Now the Largest Driver of Cyber Losses

By Ryan Windt | Head of Growth Marketing | Updated January 2026 For years, cyber risk conversations focused on stolen data. How many records were exposed?Was customer information compromised?What were the notification costs? That is no longer where the biggest losses occur. Today, business interruption has become the single largest driver of cyber insurance claims — and […]

How Cyber Insurance Protects Your Business From Phishing Attacks

By Ryan Windt | Head of Growth Marketing | Updated April 2026 Phishing is the starting point for most of the cyber incidents that end up as insurance claims. It is how ransomware gets in. It is how business email compromise begins. It is how credentials get stolen, accounts get compromised, and wire transfers go […]

Ransomware Costs and Coverage: What Happens After an Attack

By Ryan Windt | Head of Growth Marketing | Updated March 2026 In 2023, one of the United Kingdom’s oldest logistics companies ceased to exist because of a weak password. KNP Logistics Group, founded in 1865, was hit by a ransomware attack after hackers gained access through a remote desktop protocol endpoint protected by the […]

cyber criminal graphic

MGM & Caesars: Human-Factor Attacks and Lessons Learned

In September 2023, social-engineering crews hit MGM Resorts and Caesars Entertainment. Caesars reportedly paid a ransom around $15M, while MGM booked more than $100M in business impact. The entry point wasn’t a zero-day; it was identity tricks and help-desk manipulation. AP News Same playbook, new headlines (2024–2025) Bottom line: attackers don’t need your zero-days if they can […]

What the LastPass Breach Taught Us About Password Security and Cyber Insurance

By Ryan Windt | Head of Growth Marketing | Updated March 2026 Even strong security programs can’t make risk disappear—but they can make incidents survivable. The 2022 LastPass breach is still a great teaching moment because it produced two dramatically different outcomes for users depending on basic habits. Context: What happened at LastPass (short timeline) Aug 2022 – […]

Insider Risk: How to Control the Threat Inside Your Office

The answer is yes. Here’s why – and specific steps to mitigate the threats.
The truth is that, despite dramatic plot-lines in movies and news stories, the most common cybersecurity threat isn’t from shadowy, skilled hackers, but from all-too-human mistakes and weakness within your organization. 

SaaS Applications: the Hidden Threat in Plain Sight

By Ryan Windt | Head of Growth Marketing | Updated March 2026 SaaS made business faster, cheaper, and more collaborative—but it also shifted risk into places that traditional perimeter tools can’t see. Most compromises don’t start with exotic zero-days; they start with misconfiguration, excessive permissions, malicious OAuth consent, or a weak help-desk workflow. This rewrite […]

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.