<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1354242&amp;fmt=gif">

Corvus Insights Blog

Our thoughts on cyber risk, underwriting, data science, and insurance.

Cyber Coverage Explained: Wrongful Collection of Data

As regulators crack down, wrongful collection of data claims are increasing rapidly. How can brokers and carriers provide the best solutions for clients?

A Guide to Security Controls For Cloud-Based Organizations

What are the best practices for implementing security controls for cloud-based organizations? Find out in this short cybersecurity blog!

March 2023 Sees 60% Increase in Ransomware Attacks

Corvus observed 452 new ransomware victims on leak sites in March 2023. Ransomware is up 60% from this time last year, and 141% from two years ago.

Emerging Risks for Tech E&O Clients in 2025

Cyber threats are rising for tech firms in 2024. Learn key Tech E&O trends, risks, and solutions to help your clients stay protected and well-covered.

A Guide to Securing Access Controls

What are the best practices and resources to help secure access to your organization’s systems? Find out in this short cybersecurity blog.

How to Take Email Security to the Next Level

What are the best practices for email security? Find out how to boost your email infrastructure in this short cybersecurity blog.

How Healthcare is Responding to New Guidelines for Pixel Tech

When it comes to ad-tracking technology, the healthcare sector is the first regulated industry to land under the microscope. Learn more in this blog.

Q1 2023 Cyber Vulnerability Report and Impact

Fortinet, Adobe ColdFusion, 3CX Desktop, Bank Wire Fraud, ESXi, Jira, FortiWeb, Control Web Panel, Zoho ManageEngine, and Git vulnerabilities from Q1 2023.

A Guide to Data Encryption

What are the best practices and resources to help protect data across your organization? Find out about data encryption in this short cybersecurity blog!

A Guide to Threat Detection

What are the best practices and resources to help your organization detect cyber threats early and respond? Find out in this short cybersecurity blog!