Reports

Technical insights into risks in practice: a selection of whitepapers, case studies and guides to help inform our clients and share our knowledge.

Editor’s pick
Global Claims Review: The Top Causes of Corporate Insurance Losses
07 January 2019

This report focuses on global developments in corporate insurance claims over the period 2013 to 2018.

  • /assets/Thumbnails/Non-People%20Thumbnails/Brochures%20and%20Publications/Megacity_Title_106_x70.png
    Megacities - Pushing the Boundaries of our Industry
    17 October 2016

    This report examines how natural catastrophe, pandemic outbreak, terrorism and cyber risk could potentially affect megacities in future and provides insight into the different ways in which the insurance industry will be impacted.

  • /assets/Thumbnails/Non-People%20Thumbnails/Brochures%20and%20Publications/AGCS-Rise-of-the-drones-report_106x70.jpg
    Rise of the Drones - Managing the Unique Risks Associated with Unmanned Aircraft Systems
    13 September 2016

    This AGCS report examines the key issues and trends underpinning rapid growth in usage of UAS and provides insight into the potential risk exposures related to their deployment in the private, public and commercial realms.

  • /assets/Thumbnails/Non-People%20Thumbnails/water%20damage_thumbnail.JPG
    Protect Your Commercial Buildings from Water Damage due to Plumbing Leaks
    07 June 2016

    Avoiding business interruption due to water damage caused by plumbling leaks can be very costly, especially when combined with liability claims by tenants, guests or other property owners.

  • /assets/Thumbnails/Non-People%20Thumbnails/flooding-thumbnail.jpg
    Protect Your Business and Employees from Flood Damage
    07 June 2016

    Avoiding business interruption, let alone employee harm, is vital in any emergency situation, including a flood. This guide gives tips for mitigating flood exposures.

  • /assets/Thumbnails/Non-People%20Thumbnails/phishing_thumb.JPG
    Protecting Your Computer: Beware of Phishing Emails
    08 June 2016

    Phishing emails attempt to acquire data – such as user names, passwords and other personal information – by masquerading as a trustworthy person, company or organization. This bulletin provides guidelines for how to avoid the trap.

Page: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29