Our Recent Blogs

Stay Safe and Survive: Why You Need Cyber Insurance to Protect Your Business

Stay Safe and Survive: Why You Need Cyber Insurance to Protect Your Business

As we move further into an age largely dominated by the use of technology, the increased need of having a proper cyber risk protocol becomes even more important. But what do you do if your information is available to vendors or other external companies as part of your normal business operations? Can you rest soundly knowing that they take cyber risk as seriously as you do? Or do you have to wait until something happens and the ramifications cause major harm to your bottom line and reputation?

read more
Consumer Data Rights: What Are Your Obligations?

Consumer Data Rights: What Are Your Obligations?

As we move further into an age largely dominated by the use of technology, the increased need of having a proper cyber risk protocol becomes even more important. But what do you do if your information is available to vendors or other external companies as part of your normal business operations? Can you rest soundly knowing that they take cyber risk as seriously as you do? Or do you have to wait until something happens and the ramifications cause major harm to your bottom line and reputation?

read more
Professional Indemnity In Simple Terms

Professional Indemnity In Simple Terms

As we move further into an age largely dominated by the use of technology, the increased need of having a proper cyber risk protocol becomes even more important. But what do you do if your information is available to vendors or other external companies as part of your normal business operations? Can you rest soundly knowing that they take cyber risk as seriously as you do? Or do you have to wait until something happens and the ramifications cause major harm to your bottom line and reputation?

read more
Gremlins in Your Supply Chain: What You Need to Know About Third-Party Cyber Risk?

Gremlins in Your Supply Chain: What You Need to Know About Third-Party Cyber Risk?

As we move further into an age largely dominated by the use of technology, the increased need of having a proper cyber risk protocol becomes even more important. But what do you do if your information is available to vendors or other external companies as part of your normal business operations? Can you rest soundly knowing that they take cyber risk as seriously as you do? Or do you have to wait until something happens and the ramifications cause major harm to your bottom line and reputation?

read more
Do You Have Your Insurance Under Control?

Do You Have Your Insurance Under Control?

Most people already know that insurance is a fact of life, whether you’re looking to keep your vehicle legal on the road or simply want to protect your investment in your business. There will come a time when you need to purchase a policy. With so many companies out...

read more
Are you on top of your AML obligations?

Are you on top of your AML obligations?

AUSTRAC’s appointment of an external auditor to Afterpay Pty Ltd to examine its compliance with the Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (AML/CTF Act) is a reminder to all financial service providers, FinTechs in particular, of their...

read more
Do Private Companies Need Directors Insurance?

Do Private Companies Need Directors Insurance?

There is a misconception that only directors of publicly listed companies need Directors & Officers (D&O) Liability insurance to cover them against lawsuits brought on by shareholders. The fact is that private company directors have just as much exposure to a...

read more
What are the top 4 challenges facing Fintechs?

What are the top 4 challenges facing Fintechs?

The Fintech sector has experienced exponential growth since its emergence. It has proved to be highly disruptive and transformative as consumers are now offered more choice and control over how they handle their finances. As a consequence it is gaining the attention...

read more

Contact us for a Free Consultation