Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Making it Work When Working From Home
Working remotely can be invigorating from time to time, but there’s a reason why we don’t do it permanently. If we’re forced to work remotely for a long period, how do we overcome isolation effects? Working together in an office has a number of social benefits. You...
Get a free copy of our COVID19 Business Readiness Kit
In this kit,we’ll take a look at how you can effectively check your systems, processes, and people are ready for the impacts of COVID19. We’ll explore the key things you need to consider relating to: The tools you use and how...
Covid-19 (CoronaVirus) and your IT
No amount of AntiVirus software will help with this one! Whether this is a "Black Swan" event or not, it's certainly having an impact. As I write this, there are stories of panic buying of hand sanitiser and face masks at the local supermarkets. That means it's...
Google Chrome – Urgent Security Warning
Security Advisory – Google Chrome Google has reported a security issue in the Chrome browser. This issue is known to attackers and it is already being exploited by some. All versions of Chrome are affected. Google have released an update for...
Are you really at threat from Cyber-Crime? 2 trillion reasons to say YES.
In New Zealand, the National Cyber Security Centre (NZ Govt - https://www.ncsc.govt.nz/ reports they reduced harm in NZ by $27.7 million in 2018/19. We know that’s just the tip of the iceberg – most cyber crime still goes unreported and certainly doesn’t get stopped...
With yet another IT security warning from the NSA, we’re being asked “so what is best practice?”
Aligning with NIST.....? Is your Cybersecurity protection matching best practice? Clearly the cybersecurity stakes are higher. The security precautions that used to be reasonable are no longer enough. Stakeholders expect businesses to do more – whether it’s your...
What will the 20’s decade bring?
There’s a debate raging in our office as to whether the new decade begins this year, 2020, or next, 2021. Regardless, we can all agree on the vast change in everyday technology since 2010. It’s a great time to reflect on what we might see in the next ten years, using...
Is your Bluetooth safe?
Bluetooth has become ubiquitous. We use it to connect our phones, laptops, keyboards, mice, headphones, speakers, cars – more and more each day. Even watches now! It seems to have got easier, maybe because we’re so practised with it. Bluetooth is everywhere. ...
THREE EDGE TIMESAVERS
Who still uses Microsoft Edge? It’s a point of pride among many users to immediately swap out their default web browser on Windows from Edge to something else. To be fair, that’s because Microsoft’s past browsers have fallen behind the marketplace – other browsers...
Taking your business to Azure Cloud – and beyond
TAKING YOUR BUSINESS TO MICROSOFT AZURE CLOUD – AND BEYOND We’ve all heard the benefits of moving to cloud. There’s the ability to scale resources up and down, a reduction in infrastructure and maintenance costs, easy accessibility, and improved security, compliance...