Insurance Reports

Insuring the uninsurable: Is cyber insurance worth its salt?
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security Thesis series discusses the risks and benefits of cyber insurance and outlines steps businesses can take to make better informed risk mitigation decisions.
Posted: 08 Feb 2021 | Published: 12 Sep 2017

TechTarget ComputerWeekly.com

Royal Holloway: Lessons on catastrophe - differences and similarities between cyber and other forms of risk
sponsored by TechTarget ComputerWeekly.com
RESOURCE: Cyber insurance is still in its infancy but has shown significant growth, with evidence for further expansion. However, a lack of past information and some idiosyncrasies make pricing difficult, as well as potentially amplifying risk exposure. This article summarises findings from a practical model that could be used in lieu of actuarial data.
Posted: 08 Feb 2021 | Published: 06 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly - 19 July 2022: Tracking the rise of homeworking across the UK
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, homeworking has more than doubled in the UK due to the pandemic – we look at the regional differences. The pressure is growing on cyber security teams – we find out how to avoid staff burnout and lost talent. And we examine the role that tech startups play in the growth of Amazon Web Services. Read the issue now.
Posted: 15 Jul 2022 | Published: 19 Jul 2022

TechTarget ComputerWeekly.com

Big Data Integration and Governance Considerations for Insurance
sponsored by IBM
WHITE PAPER: This resource explores key considerations of big data integration and governance in the insurance industry. Read on to learn more.
Posted: 23 Dec 2013 | Published: 23 Dec 2013

IBM

Insurance 2020: Innovating beyond Old Models
sponsored by IBM Line of Business
PODCAST: Podcast discusses the strategic challenges insurance companies will face in the insurance marketplace of the future and shares ideas for moving from today's realities to tomorrow's potential.
Posted: 12 Jun 2008 | Premiered: Jun 12, 2008

IBM Line of Business

FlexiCapture Drives Business For the Insurance Industry
sponsored by ABBYY
WHITE PAPER: Insurance agents across the country are saving time, saving money and writing more business using AppReader: The automated form conversion solution that allows applications to upload instantly to carrier systems, regardless of agency management system. Read on and find how how AppReader can benefit your business.
Posted: 23 Feb 2011 | Published: 23 Feb 2011

ABBYY

CRM Solutions For The Finance And Insurance Industries
sponsored by SAP America, Inc.
WHITE PAPER: Read this report to learn how Forrester Research rated 24 CRM solutions in terms of their strengths and weaknesses in supporting four key cross-functional processes in the finance and insurance industry.
Posted: 28 Mar 2012 | Published: 14 Feb 2011

SAP America, Inc.

Creating Stickiness in the Insurance Industry
sponsored by Thunderhead
WHITE PAPER: With the economy being shaky, the insurance industry has a problem. Customers are increasingly shopping around and making complex demands. Learn how to achieve loyalty in a shaky industry.
Posted: 16 Jun 2011 | Published: 01 Jan 2011

Thunderhead

Medical Office Increases Productivity with New Communications System
sponsored by Cisco Systems, Inc.
VIDEOCAST: This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

E-Book: New Rules for HIPAA
sponsored by TechTarget Security
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

TechTarget Security