header image
 

LATEST BLOG STORIES

August 2018

Cybersecurity Considerations for Your Business Continuity Planning

There is no doubt that businesses and organisations of all types and sizes must include cybersecurity concerns in their business continuity plans, and they need to sit side by side with the more traditional threats, such as severe weather or supply-chain disruptions. However, cybersecurity necessitates a different level of attention, because a cyber attack or data breach can have such wide-reaching effects throughout an entire company, as well as among its partners, suppliers, and clients.

When you look to integrate cybersecurity concerns into your business continuity planning, be certain to consider these important points:

Cybersecurity and business continuity are inter-reliant

In today’s hyper-connected world, cybersecurity issues and business continuity are inseparable. Cyber attacks and data breaches year on year can and will considerably disrupt a company or even worse put it out of business—due to lost data, compromised personal or financial information, unplanned downtime, and other challenges. A single cybersecurity incident can result in lost productivity, decreased revenue, and a damaged reputation to name but a few.

There’s no refuting that cybersecurity and business continuity must be joined at the hip. Once thought as two separate items altogether, they should now, ideally, work in unison to minimise costs, protect data, and streamline a timely and effective response to any actual attacks or data breaches.

Business continuity employees need to be IT-minded

As the business continuity manager, you have an opportunity to educate your team and the business on the important role that cybersecurity plays in business continuity efforts overall. Many companies have to battle the assumption that IT security is “owned by” the IT department. In reality, the whole business has a responsibility in protecting its digital data and systems.

Where to begin educating your team

  • Consider holding a brief workshop on the importance of IT security and cover the items below:
  • Educate your team on the key facets of IT and how they impact the whole organisation.
  • Provide an overview on the IT security techniques and systems used, as well as the core challenges associated with safeguarding network-enabled technologies—including increasingly sophisticated hacking strategies and good, old-fashioned human error
  • Explain how difficult it can be to fully recover IT networks and systems and ensure proper operation, all of which are vital to ensuring business continuity.

Business continuity planning must take on board IT-dependent applications

Consider and review your most recent business impact analysis. Does it account for all IT-dependent applications, such as the company website, social media platforms, and shared and restricted network drives—and all the extensive and valuable information stored there? Does it totally pinpoint all critical IT processes, data, and locations that support the company’s revenue, customer information, trade secrets, and other vital sensitive information?

To safeguard the continuity of IT-related systems, be sure to include secure workarounds or redundancy into your business continuity planning, permitting stakeholders to obtain access in the result of a system or network failure. You must then meticulously test all backup systems in place.

Disaster and crisis communications should be assimilated

As a final point, consider whether or not your organisation is ready to quickly and successfully respond to and communicate with external stakeholders during a cybersecurity incident. If a breach occurs, you will need to issue statements and updates to customers, suppliers, partners, the media, and other interested parties.

It’s no longer sufficient to meet baseline technical requirements for post-incident response and communications with regulators and consumers. You should also work to get ahead of the game during any incidents by communicating the correct information to all parties involved. You could consider incorporating the companies’ official, mandated response with communication through other platforms, such as social media. This will help keep your messaging consistent and ensure that the company’s reputation is being managed well.

Have you considered a high level cyber / GDPR risk review of your business?

Working in conjunction with Riskworks, the team at NexusProtect will come into the business and carry out a strategic level health check of your current general security, cyber and Information management.

Working alongside your key business personnel the NexusProtect team will go through your current systems and procedures and compile a report on the security infrastructure of your business. The health check will support the identification of key risks, if any, and support an action plan on how to reduce any risk which is identified.

To discuss your approach to business continuity and cybersecurity contact Jon Davies and the team on 01625 547754 or visit http://www.cyberliability.uk.com/

July 2018

Cyber threats – How can companies brace for the storm?

Governments and industries worldwide are engaged in a race without a finish line.  Adversaries will be continually adjusting their strategies and be identifying new targets and more destructive attacks.

While there are many technological advances that will form part of the solution, businesses need to be looking at the organisation as a whole identifying the risks that face them on a daily basis and put the necessary plans in place to mitigate the risk

Cybersecurity is not the role of I.T. alone

The most senior members of a company’s management team must engage and be at least conversant with this dynamic risk. In your organisation, can the CEO, the CFO or the GC answer the following three questions:

  • What are your company’s principal cyber vulnerabilities?
  • What are your key strategies for mitigating those risks?
  • Are adequate resources being devoted to the task at hand?

Vulnerability assessments are essential.

Every company should conduct a vulnerability assessment. The best place to start is to benchmark your cyber protocols against an established standard.

What are your most critical cyber assets?

Does your organisation primarily rely upon proprietary data or industrial control systems?

Have you assessed the true financial consequences of a large-scale breach?

Cyber risk is now a board-level issue.

Supervisory boards will be putting far more focus and pressure on management teams in the coming year. Expect your board to ask questions about:

Patching of software vulnerabilities implementing multi-factor authentication for user access, and conducting risk assessments of third-party vendors and suppliers.

If it takes your organisation three times longer to identify a cyber intrusion as other companies, will that be satisfactory for your board?

What cyber insurance does the business have in place?

Internet and network exposures are usually excluded from traditional insurance policies.  Riskworks, however, works with leading cyber risk insurers to develop cyber risk insurance protection including:

  • Liability, privacy, and confidentiality
  • Telephone and mobile hacking
  • Copyright trademark and defamation
  • Malicious code and viruses
  • Business interruption and computer failure
  • Attacks
  • Unauthorised access
  • Theft
  • Website defacement and cyber extortion
  • Technology errors and admissions
  • Intellectual property infringement
  • Consequential reputational harm

Talk to Jon Davies and the team on 01625 547754 or visit www.cyberliability.uk.com

 

May 2018

Organisations can leverage GDPR compliance to strengthen overall cyber risk management.

Complying with the GDPR by 25 May 2018 is a business-wide challenge that will take time, tools, processes, and expertise. It may also require significant changes in an organisation’s privacy and data management practices.

But focusing on the scramble to comply with GDPR, while important, misses the broader impact that compliance efforts are having. In many organisations, GDPR has become a flashpoint, focusing senior leadership attention not just on specific sets of data or privacy protections, but on a broader, more strategic view of cyber risk management.

After all, cybersecurity readiness is foundational to establishing that an organisation has, as the GDPR puts it, “appropriate technical and organisational measures” in place. The most prepared organisations use the explicit cybersecurity requirements of the new rules as a starting point — and adopt a broader set of cyber risk management best practices. There is still much work to be done, and room for improvement.

But what sets apart the organisations that have made the most progress?

First, they understand that cyber risk management is a shared responsibility that extends from the IT department to the executive suite. Regardless of size, many of these organisations have set up internal cross-functional task forces or steering committees led by senior executives — sometimes including or reporting to the CEO. These organisations are using the GDPR compliance process to look comprehensively at how they collect, retain, use, and manage data across the enterprise. They are exploring new tools, such as the use of cloud services; champion privacy rights; and have made significant investments to ensure that any information they possess is secure. More broadly, they are reexamining their privacy and data protection practices to make sure that their people, processes, and technology are properly aligned.

Second, they treat cyber events as inevitable. Instead of focusing only on preventing cyber-attacks, they respond to incidents more quickly and reduce the potential damages. They view GDPR’s data breach notification requirement as an opportunity to develop stronger incident management protocols — whether that means purchasing cyber insurance coverage with access to crisis management experts or encrypting their computer systems so that stolen data is rendered useless.

Finally, they take a quantitative and holistic approach. Because the GDPR compliance process requires organisations to implement measures that are appropriate to the potential threats they face, forward-looking organisations rigorously analyse their cyber risk exposures — both internal and external — and put a pound amount on potential losses. As a result, they are not only investing in appropriate cybersecurity defenses, but they are strengthening cyber incident response plans as well as other risk mitigation and resiliency measures.

In other words, these organisations recognise the GDPR compliance process as a game changing opportunity. In preparing for the new rules, they are strengthening their overall cyber risk management posture and turning what is often viewed as a constraint into a competitive advantage.

To discuss your processes and where cyber insurance can benefit you in more detail contact Jon Davies at Riskworks Business Services Ltd on 01625 547754 or email: jonathand@riskworksbusiness.com or visit: www.cyberliabilty.uk.com

January 2018

Business Continuity: Why it should be top of your business priorities for 2018.

Companies today face an unprecedented number of exposures. Disasters come in all manner of shapes and sizes, the question is have you got adequate plans in place to deal with all eventualities?

Taking steps now and producing a plan provides a better chance to reopen a business quickly. Without a business continuity plan, one in four businesses are forced to shut down.

The frequency and severity of weather-related events seem to be increasing and reliance on a complex network of technology and supply chains is ever expanding. Both trends leave businesses susceptible to a variety of existing and emerging risks.

It does not take a major catastrophe to shut down a business. In fact, seemingly minor disruptions compared to widespread natural disasters can often cause significant damage — power failures, broken water pipes, or loss of computer data.

Managing these risks by developing a business continuity strategy and insurance programme is key to the survival of any organisation in today’s environment.

Why Business Continuity?

There are plenty of reasons for businesses to plan for the unexpected. We highlight and explain a few of the key areas in the sections below:

Avoid Market Share Loss

With a business continuity plan, your business will have a better chance of remaining competitive and minimising the loss of revenue and clients. A solid and tested plan boosts customer confidence. When your clients know you have plans in place to provide continuity in the delivery of your goods and services during a crisis, they are less likely to jump to a competitor if a disaster threatens your area of business.

Brand Protection

Having a plan allows you to demonstrate that your business is committed and prepared to protect your employees, clients and their assets at all times. This demonstrates a proactive attitude and can enhance both employee morale and public opinion about your business.

Communications

Business continuity plans will improve communication within your organisation and with clients, suppliers, vendors, and key stakeholders. This is a helpful way to improve daily operations, not only in the event of disaster.

 

There are many misconceptions placed on business continuity planning by companies:

Employees will instinctively know what to do in an emergency

Wrong: Even the best employees cannot be expected to know what to do when disaster happens. Leaving people to their own devices can sometimes even add to the confusion. Having a well-documented business continuity plan in advance, training your employees to follow it should ensure everyone on the same page which will result in an organised, safe and timely recovery.

We have insurance to cover our losses

Insurance alone is NOT a business continuity strategy. The righr coverage is a significant and important part of the plan. But it may not fully cover some of the peripheral damages from an event, like loss of customers, market share, or setbacks in development or release of a new product. Consult with the Riskworks team to understand what is and is not covered under your current policy.

We do not have the time to develop a business continuity plan

Time spent developing and maintaining a business continuity plan is an investment in your company as a whole. Your fixed costs will continue after an event, whether or not you are open for business. The quicker you can return your operations to normal, the more likely you will recover from the event successfully. With so much at stake, your company really cannot afford NOT to have a plan and if you don’t have one in place now would be a good time to start.

Business continuity and disaster recovery planning are the same

Business continuity is a proactive plan to avoid and mitigate risks associated with a disruption of operations. It outlines steps to be taken pre, during and post event to maintain the financial viability of a company.

Disaster recovery is a reactive plan for responding after an event. It deals with the safety and restoration of critical personnel, locations, and operational procedures after a disaster, and is a part of business continuity planning.

Business Continuity, managing the risks and having the relevant insurance cover in place

Managing these risks by developing a business continuity strategy and insurance programme is key to the survival of any organisation.

Talk to the team at Riskworks on how we can work towards a strong continuity plan for you in 2018 and beyond on 01625 547754 or email info@riskworksbusiness.com

September 2017

Home Insurance – Your Guide to Managing Trees and Subsidence

The ever changing weather conditions and the increase in hot dry summers and comparatively dry winters in recent years has seen an increase in subsidence in buildings and properties.

Subsidence is the downward movement of the ground supporting the building. Damage occurs because the movement is often uneven, causing cracks in walls, floors and ceilings. The main cause of subsidence in the UK is the shrinkage in dry weather of clay soils which expand and contract with changes in their moisture content. The escape of water from leaking or damaged drains below the ground can also cause subsidence.

Subsidence damage to buildings is generally distinctive in appearance, cracks in walls usually having the following features:

  • Noticeable from both inside and outside the property
  • Tapered
  • Reaching below the damp proof course, this is often results in doors and windows sticking, reflecting the distortion of the building.

Much less common but causing damage of a similar nature are:

  • “Heave” is the upward movement of the ground supporting the building.
  • “Landslip” which is the movement of a mass of ground down an incline or slope trying to find a natural level.

Buildings and properties can suffer minor cracking as a result of a number of causes:

  • Consolidation settlement of soil due to the weight of the building. This normally occurs early in the life of a building
  • Temperature changes of the building superstructure causing expansion and contraction
  • Drying and shrinkage of building materials: cracks arising are generally uniform in width and narrow (hairline to 3mm) and can be dealt with cosmetically by decoration or minor maintenance work.

Common Causes – Tree Types

Research indicates that the majority of subsidence issues in buildings and properties involve trees to some degree. Trees that have fine root structures longer than other species, such as poplars, willows, elms and oaks are the most likely to cause problems.

For example: A safe distance for an Oak tree is 30m from the building.

What actions can you take to help?

If you should reside in a clay soil area there are a number of simple actions you can do to protect your property and alleviate long-term problems:

  • Do not plant trees or large shrubs close to the house, garage or outbuildings.
  • Trees which are older than the structure but within the safe distance can be managed by a programme of pollarding or crown thinning carried out to control the amount of foliage produced, which will in turn reduce the amount of water it requires.
  • Trees which are older than the structure should not be removed as this could cause uplift of the ground and heave
  • Never remove or in any way alter a tree on which there is a preservation order, without the appropriate consent.
  • If in doubt obtain specialist advice from a tree surgeon or similar professional. (Initially the cost involved will normally have to be borne by the policyholder and will only be reimbursed by the insurer if a claim is met.)
  • The tree may be within a neighbouring garden or in the street. If you are worried about the potential subsidence problems that a neighbour’s tree could cause, discuss it amicably and try to persuade him or her to take an appropriate action. Only if your neighbour is uncooperative, or the tree is the property of the local authority, write a letter expressing your concern and keep a copy for future reference.

For more information contact Emma Patrick, Private Clients Manager on 01625 547754 or emmap@riskworksbusiness.com

 

 

August 2017

What are the best jewellery investments to make your money bling?

Jewellery is more than just a luxury accessory. It is a fashion statement which can be held as an investment piece.

Enjoy the sparkle of a gemstones investment

While jewellery fans and collectors should admire key pieces of jewellery for their individual beauty, a key part of their attraction comes from the value of stones set within them and in particular coloured gemstones.  At present they are the biggest growth in the jewellery trade with over a 500% increase in the last 10 years and prices are still rising year on year.

The gemstones of note to invest in are namely rubies, sapphires and emeralds but there are other gems that you may not even of heard of that can add value to your jewellery ie: tanzanite found at the foothills of Mount Kilimanjaro can sell for £1000 a carat. Other gemstones of note include alexandrite, jadeite and muscovite, with each stone selling for more than £10,000 a carat.

Gemstones are important when pricing jewellery but it is often the skill and artistry used to place them in the jewellery that are paramount. You can also have amazing jewellery that uses relatively modest priced semi-precious gemstones such as amethyst, aquamarine and topaz.

FACT: The most valuable gemstone in the world is the 24.78 carat ‘Graff Pink’ diamond that sold for £29 million in 2010. This works out a more than £1 million per carat!

Examples of gemstone investments

Sapphire: Not just Kashmir sapphires on the rise. In 2004, a 30-carat Sri Lankan sapphire sold at Bonham’s London for £11,950. A decade later, a similar Sri Lankan stone, also weighing 30 carats, sold for a staggering £326,500. An increase of 2,800%

Ruby: Recently a very impressive ruby 10.08 carats of Burma origin and pigeon blood colour, sold for £8 Million! The prices are still increasing every year at a high level making it the number one gemstone to invest in.

Factors which impact on a gemstones investment

There are five key factors to take into consideration when considering making an investment in gemstones:

  • Colour; hue, tone and saturation properties.

Colour statement stones set within jewellery can have a major impact on the overall value of pieces

  • Clarity
  • Origin
  • Carat and treatment of gemstones.

Regarding treatment there are various ones applied to improve the quality of a gemstone from:

  • Colour irradiation, heat, diffusion and dyeing.
  • Transparency – heat and fracture filling
  • Strengthen and stability – impregnation with organic filler ie: Oil

Keeping your jewellery and valuables safe and insured

Jewellery will be covered by your home insurance but high value items should be individually listed.  It is important to have your pieces regularly valued at least every 5 years with some items requiring annual valuations.

It may be a hassle to do this and be without your jewellery but in the unfortunate instance of a claim some insurers will reimburse full cost within a 24 hour period with an up to date valuation in place.

Call Emma Patrick – Private Clients Manager to discuss ways to protect and insure your precious portfolio in more detail on 01625 547754 or email: emmap@riskworksbusiness.com

June 2017

Cyber – Are you constantly transmitting data?

From your 6.15am alarm call to lights out and head on the pillow, you’re transmitting and sharing data throughout your day. Just take a moment to think about a day in the life of your data journey and how quickly personal and business information is shared going about daily routines:

7.30am – Catching up on Facebook

Along with authentication information, Facebook will track how long you dwell on posts and of course log which posts you ‘like’ and comment on in order to optimise your experience. When you upload an image you can also tag the location

9.13am – Sending an email

The email header will track the IP address of the sender, as well as all the computers the email has been sent through

10.43am – Check your bank balance

Banking apps / websites are usually fairly secure. If using an App some authentication maybe stored on your device of access.

1.14pm – Doing some online shopping

A large number of sites use tags or cookies to track searches and then display adverts from other sites.

6.04pm – Using a health recording App

Types of data that may be collected and transmitted include heart rate, steps and location

8.43pm – Reading an online article

Some sites use adverts to help support them. Adverts showing your previous browsing history and behaviour may appear. Others may track how many articles you read and ask for your to subscribe to read more.

Tracking back through your day indicates a large amount of data leaked into the world. Not only personal information but some accessed through company equipment and systems.

What could be the consequence of your normal daily routines and do you have a cyber liability plan and insurance in place?

Speak today with Jon Davies at Riskworks Business Services 01625 547754 or email jonathand@riskworksbusiness.com

March 2017

Architects Know How – Your Insurance Tool Kit

Keep ahead of your competition with our works insurance tool kit

If you’re an architect working on a high-value domestic renovation, you need the knowledge and skills to give your client the very best advice on a spectrum of issues. By adding a little insurance know-how to your toolkit, you put yourself ahead of the competition and can speak with authority on a topic that’s both a grey area and an afterthought for many.

Riskworks can advise you on JCT compliant insurance for large domestic renovations projects including:

  • JCT Contracts
  • Existing Structures & Works

Insurance is often a last-minute inclusion to a JCT contract. In a market where things can often run over time and budget, we’re confident this information will help avoid unpleasant surprises for your client Works on existing structures are often the backbone of a practice. Though the differentiator between you and your competitors could boil down to your creative spark, its also good to develop a reputation for smooth running projects. Good insurance knowledge can help make that happen.

BACKGROUND INFORMATION ON INSURING EXISTING STRUCTURES

Existing structures were a challenge to insure in the context of JCT. The contract works insurance market is well established for builders, but property owners are often unaware of their insurance obligations under the contract you specify for them. Their experience of properties undergoing building works is often limited and they need your advice.

Insurers find unoccupied properties that are subject to a JCT a problem. The good news is that we can now insure both the existing structure and the works under one policy, against ‘All Risks’ and importantly in the joint names of your client and their contractor. This keeps your client in control of their insurance and protects them from the complexity of dealing with a contractor’s insurer in the event of a claim.

As the creative and technical leader of a high value renovation project, your clients look to you for guidance so knowing the right way to insure the project is important.

THE BASICS OF JCT JOINT NAMES & SUBROGATION

The JCT joint names requirements under the 2011 suite of contracts causes problems for a number of UK existing structure insurers and their re-insurers. With the Employer and the Contractor named as insured it means that the existing structure insurer cannot recover their outlay if the Contractor causes damage to the property insured.

With losses historically infrequent but often very large standard property insurers are reticent to get involved in providing existing structure insurance during projects. Our supporting underwriters understand this type of insurance, are relaxed about JCT and look to support clients who are undertaking JCT based projects.

HOW CAN RISKWORKS ADD VALUE TO YOUR SERVICE?

We have products that allow joint names and overcome these issues. By working with us, you’re keeping your client in control of their project whilst still ensuring they get comprehensive cover.
To help you get ahead of the competition call Emma Patrick at Riskworks Business Services Ltd on 01625 547754 Or email: emmap@riskworksbusiness.com

 

November 2016

Hi-tech car thieves’ access to your vehicle is evolving at a fast rate.

Watch out for the hi-tech car thieves. Technology has made vehicles safer and more efficient but thieves are exploiting weaknesses in the latest systems to compromise security and steal high-performance cars to order.

Car hacking

One of the most common hi-tech thefts, widely known as car hacking, targets vehicles with keyless ignition systems:

  • Thieves use a hand-held radio jammer to block the signal to remote locking car keys
  • This renders them useless and, although the driver will think they have locked their vehicle, it will remain unlocked
  • Thieves are then able to gain access to the vehicle and, within minutes, can re-programme a blank electronic key to start and steal the vehicle

Even if vehicle has a more traditional key-operated ignition. Thieves are still able to gain access to the vehicle and steal any valuables.

Access through the infotainment system

This latest potential threat is even more sinister. This exploits the infotainment systems that are becoming increasingly popular in vehicles. These systems allow drivers to play music, make phone calls and view vehicle information but technology security experts have demonstrated that it is possible to hack into them by sending data through the digital audio broadcasting (DAB) radio signals. This is particularly concerning as these infotainment systems are often connected to the same computer systems that manage the vehicle’s steering and braking. This means a hacker could take control of a vehicle and potentially put the occupants’ lives in danger.

Manufacturers and Cyber protection

Vehicle manufacturers are taking these threats seriously and are looking at ways to improve security and deter the criminals. In the UK, the motor insurers’ automotive research centre, Thatcham Research, is also looking at ways to combat these hi-tech forms of vehicle crime. As well as using its position to influence vehicle and product manufacturers to take a coordinated approach to developing security solutions, it is also a member of the Cyber Security Consortium for Connected Vehicles.

How implementing some of the old basics of car protection could deter thieves

Reviving some of the security measures that were commonplace in the 1990s will also help to reduce the risk of theft from car hacking:

  • Park vehicles in a secure, well-lit area, preferably in a locked garage or compound if possible
  • A range of security devices are also available to deter thieves including alarms, immobilisers and tracking devices as well as steering wheel locks and locking wheel nuts

We can’t stop these unfortunate events from happening, but the insurance cover you have in place to protect you will have a huge impact on the outcome and can bring normality back into your daily life. Call our experienced insurance team on 01625 547754 or email info@riskworksbusiness.com

November 2016

Why specialist motor insurance is far from the ordinary

You may have chosen to drive something a bit more special than a standard vehicle or you may have a fleet of family vehicles parked on your drive. It’s therefore important to consider an insurance cover that includes features you wouldn’t find in ordinary standard cover. Detailed below is an overview of the features and benefits you can expect:

The benefits of fully comprehensive cover

Whatever car you are driving, even those not owned by you. As the policyholder you could drive someone else’s car fully comprehensively, with the added advantage that anyone over 30 years old can also drive your cars – fully comprehensively with your permission. Ideal if you need to move cars from one location to another or if you require transport to the airport in the comfort of your own car, making the art of delegation that bit easier.

A guaranteed value

In the unfortunate event your car is written off, a specialist motor insurance cover will pay you up to the agreed value or replace it with a brand new car if less than a year old and one is available.

Your individual choice of garage

Specialist motor cover insurance enables you to choose the garage where repairs are carried out, thus making the whole experience as convenient as possible for you. Some options also offer a three-year guarantee on repairs carried out by an approved garage.

A courtesy car similar to your own

Should you have the need to borrow a courtesy car for the duration of repairs, we will arrange a like for like vehicle. It is no use providing you with a small car that doesn’t match up to your needs or expectations.

An unlimited number of foreign trips

If you travel abroad your car will be covered for an unlimited number of foreign trips, up to a maximum of 90 days per trip. This includes European breakdown cover.

Peace of mind

You can rest assured knowing you have cover in place for your personal plates, lock replacement and audio system. You will also be protected in the unfortunate event you can’t drive due to ill health or if you lose your licence.

Regular information on the process of any claim

We will provide you with access to a 24/7/365 helpline so you can keep track on the status of your claim and find out when you’ll be back on the road in your car.

All of the above linked to competitive premiums and a product that keeps you in the manner in which you are accustomed to. There may of course be cheaper quotes out there but they certainly cannot offer you the benefits detailed above provided by specialist insurance covers – so why not talk to Emma Patrick at Riskworks Business Services Ltd today on 01625 547754 or email emmap@riskworksbusiness.com

femdomcc.org
logo
Riskworks Business Services | Fulshaw Hall |
Alderley Road Wilmslow | Cheshire | SK9 1RL Telephone:
01625 547 754
Riskworks Business Services Limited are authorised and regulated by the Financial
Conduct Authority

Company registered in England No.: 3778537
Follow us on Twitter