Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
FVLB – Migration to Azure Cloud Services
Overview The Film and Video Labelling Body (FVLB) is a not for profit organisation that is responsible for rating films that are made available to the public. The Labelling Body: Rates unrestricted films Cross-rates unrestricted films that have been rated in...
Don’t click!
We're seeing this phishing attack over and over this week. Your first clue that something is wrong is it doesn't look like voicemail emails you might typically receive. Unless you have a brand new voicemail/phone system these shouldn't change format! The second clue...
Zero-Trust IT Security
'Zero-Trust' is a tough headline. Zero-trust in a world where we trust people all the time is an unpleasant concept. We trust that when we order a package online, that the vendor will take our order and not just our money, that our product will be passed to a courier...
We are who we know
Managing contacts has become more important than ever. Here’s a few tips on how to make use of smart tools built into Outlook: 1. Rather than exchange business cards (so last century)... Share your contact details using Linked In – just hit the box on the right of the...
What is “Dark Mode”? Why should you consider it?
With all our warnings about cyber-hackers, you’d be forgiven for thinking this was another hazard. But no! Dark Mode is a good thing! You can activate it on Windows 10 by going to Settings – Personalization – Colors and picking Dark. Most phones also offer the same...
What does IT mean to you?
Who do you call when you need to : update your IT usage or data privacy policies manage your internal IT staff? select new business software, e.g. CRM or financial software? accelerate a process or break a business processing log-jam? Traditionally businesses think of...
5 simple steps to stay cloud-cyber-secure
We’ve posted repeatedly about cyber-security and the need to be more vigilant and more careful, and we’ve shared real-world stories to reinforce the concern. It’s a concern then that we still see a number of organisations that remain reluctant to increase their...
What are we about?
"Who" is sometimes just as important as "what"? As a client, you know what we do. But we thought you might want to know more about "who we are". By that we mean, "what are we about". When you boil it down, the Kinetics mission is to help our communities. That is...
Cyber-risk mitigation – why Multi-Factor Authentication (MFA) is vital, but NOT enough
We keep making the point that nothing can guarantee you won’t be hacked. But you can, and must, mitigate your cyber-risk. We think tools like Multi-Factor Authentication is crucial for protecting your IT systems – and MFA should be on EVERYTHING you use – your email...
What are your 2021 New Years (IT) Resolutions?
It's a new year and who knows what it will bring? COVID vaccines or not, 2021 is bound to have surprises. One prediction we can make with absolute confidence is that we need to be more careful than ever about protecting our data from ever-increasing computer security...