Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
When good updates go bad (resulting in Windows 11 Endless Reboots)
Navigating the Challenges of KB5039302: A Guide to Recovery. In the ever-evolving landscape of technology, updates are a constant. They bring improvements, new features, and security patches. However, occasionally, an update may not go as planned, leading to...
TeamViewer Compromise
TeamViewer is a common piece for software that allows IT businesses to remotely access, control, manage, monitor, and repair devices – from laptops and mobile phones to industrial machines and robots. Many software vendors include it to allow them to remotely support...
Lawfirm moves into the cloud with Azure Virtual Desktop
Kinetics moves McElroys into the cloud with Azure Virtual Desktop. With ageing server infrastructure supporting its practice management software coming up for a refresh, law firm McElroys checked in with its managed services provider Kinetics for guidance on the...
What should you know about Microsoft AVD?
Why is "Azure Virtual Desktop" (AVD) important?In today's fast-paced world, the ability to work remotely is not just a convenience; it's a necessity.That's where Azure Virtual Desktop (AVD) comes into play, offering a seamless transition from traditional Remote Access...
Cert NZ Business online security assessment tool
A Personal Encounter with Cert NZ's Assessment Tool. Have you recently received an email about cyber-security that set off your system's alarms? It's ironic isn't it? That was my recent experience with an email from Cert NZ. Despite the initial warning, the email...
3 Easy Tips for Excel
Here are 3 essential tips for Excel users starting from beginner users through to advanced users.For Beginners: Excel Quick Access ToolbarThe Quick Access Toolbar is in the top right of every Office app. Ensure the commands you use most frequently or those that are...
Eliminate embarrassing screen pop-ups during video calls and Teams meetings
Say goodbye to annoying email alerts, video call pop-ups and Teams meeting interruptions. Imagine if you were on an important video call with a client, confidently presenting your latest proposal, or project update. Suddenly, a notification pops up on your screen...
Avoid the IT Travel Woes
Free Webinar Replay : Avoid the IT Travel WoesBusiness travel is fraught enough. It's a nightmare to balance tight connections, and tough time zones with work colleagues that are accustomed to being able to link you into Teams meetings and urgent chats.How can you...
Copilot Update – How the AI is getting more useful
Copilot keeps getting better and better. We’re going to keep you updated on developments as we become aware of them. Firstly, make sure you have the Copilot app on your phone. You can download it here. It will create imagery, write content and even work with photos...
Lessons from the Change Healthcare attack. Why MFA Matters
By now, regular readers know how important MFA is. Unbelievably, there are still some people who think this is for someone else, and they don't need it themselves. Unfortunately, we are seeing some of these people fall victim to the very scams we've been writing...