Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
The Worst Hack in US History
In the last week, we’ve seen two major successful attacks on critical US IT management and Cyber security tools. The first we learned about was on FireEye which is one of the leading and most trusted cyber security tools, used by much of the Fortune 500. ...
Windows 7 slips quietly away
There is no doubt about it, 2020 will be a year to remember. COVID : Lockdowns, work from home, toilet paper shortages, return to level 3, hand cleaners, level 2, mask envy, normality (kind of), lockdown again, election(s), housing market and more. Perhaps the only...
DDOS – Distributed Denial of Service Attack (aka what went wrong at the NZ Stock Exchange)
Denial of Service (aka what went wrong at the NZX?) In September the NZ Stock Exchange was the victim of an attempted extortion via a DDOS attack. The attack took them offline serval times over a number of days. Many business are now asking, what is DDOS and could...
What’s new in Microsoft Office for the end of 2020?
There is a pay-off!! While there are few things as annoying as Office occasionally pausing to install new features, there is a benefit in the new abilities you get. While the timing always seems to be terrible, it should save you time in the long run. Here’s three of...
Urgent Security Warning – Nitro PDF
CERT NZ have issued a warning about Nitro PDF. It’s a common PDF tool that users log into to share documents. Unfortunately, there are reports that hackers have breached their database We’re being told that “Nitro PDF, a PDF enterprise document creation and sharing...
Keeping our Security tools up to speed
Cyber-crime is estimated to earn criminals US$7 Trillion a year That sort of money buys cyber criminals a lot of resources. It’s no surprise then that cybercrime has its own support industries. You don’t need to access the "Darknet" to purchase hacker tools. Many...
GOOD PROCESS WASN’T GOOD ENOUGH – SCAMMERS STILL WON
In August we all heard about Team NZ falling prey to a $2.8 million invoice payment fraud. It was the now-familiar story of a fake or hacked email, asking for payment to go to a different bank account. We should all be familiar with these tales by now. I’m sure that...
Hacking the hackers (aka what goes around, comes around)
Even hackers can be hacked! Isn't that serendipitous? There is a website, Cit0Day.in, which hosts 23,000 hacked databases. Access is available at a cost, daily or monthly subscription. Hackers mine this data for passwords and other information. They then use this...
40 years of the IBM PC
For our working generation, desktop computers have been a mainstay of our work life. Its a very different world to the generation before us. In fact this month marks 40 years since IBM signed two young men from a new business called 'Microsoft' to write the operating...
When imitation isn’t flattery!
According to CheckPoint, Microsoft is THE most imitated brand on the internet. We all know that criminals like to pretend to be Microsoft for their phishing attempts, and in the last quarter, misuse of the Microsoft brand for this jumped dramatically – 19% of all...