CNA Legal NoticesNote: The information, examples and suggestions presented in this material have been developed from sources believed to be reliable, but they should not be construed as legal or other professional advice. CNA accepts no responsibility for the accuracy or completeness of this material and recommends the consultation with competent legal counsel and/or other professional advisors before applying this material in any particular factual situations. Any references or links to non-CNA web sites are provided solely for convenience and CNA disclaims any responsibility with respect thereto. This material is for illustrative purposes and is not intended to constitute a contract. Please remember that only the relevant insurance policy can provide the actual terms, coverages, amounts, conditions and exclusions for an insured. All products and services may not be available in all states and may be subject to change without notice. CNA is a registered trademark of CNA Financial Corporation. Copyright 2013 CNA. All rights reserved.
Organizations must implement best practices to protect their network from malicious code designed to destroy data. We look at prevention strategy sources. Read More
Although no system is impenetrable, you can mitigate your losses with help from a former cybercriminal. Learn why.
IT security experts discuss motivations and methods behind cybercrime. Understanding the risk specific to your organization is an important element in building your defenses. Read More