Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Feeling less Vulnerable
When the Microsoft cloud had a momentary failure in early May, most of us had an uncomfortable hour with limited access to our files and systems. It seems that some red-faced engineer at Microsoft made a simple small mistake that impacted systems all around the...
RIP Windows 7, SQL 2008 and friends
It's time to say goodbye to Windows 7 The end of the (support) road is approaching rapidly. They are over ten years old which is ancient in IT terms. If you think about tech around your home or in your daily life, then its quite understandable that these products...
The alarming business models of cyber-criminals
Cyber-crime has become big business It's organised, and the purveyors are shameless in their determination to steal from all of us. Heaven only knows where they get their names from. One group we recently became aware of is called 'PINCHY SPIDER', and they are doing...
Anyone can be hacked! And anyone can be the cause.
Guess who got hacked? In recent articles, we’ve warned that people are the weakest link in your IT security. We’ve also warned that any business is a target. No one is immune. Tech companies like us are especially cautious because, in order to do our job, we have...
Updated Privacy Laws coming to NZ
Overshadowed by overseas privacy law changes like GDPR, our own NZ Privacy legislation has flown a little under the radar. But rest assured, changes are coming here as well. The last change in NZ Law was 1993, and it was world-leading at the time. Then in 2011, the...
Te Whangai – Growing People by Growing Plants
We are incredibly proud to have helped The Te Whangai Trust. They are an amazing organisation. There’s a whole group of society that miss out on the opportunities many of us take for-granted. While many under-privileged members of our community can access various...
Using the Cloud to compete globally from New Zealand
As a small kiwi business working in a global context, The Conference Company (TCC) faced some unique challenges. They compete around the world to host some of the most pre-eminent events against impressive competition from much larger operations. TCC has to present...
Have you noticed the new Office search?
We love that Office365 keeps improving. One of the most common challenges we all have is finding things. So, if this resonates for you, the new search feature might be just what you need. [header2 text="Microsoft Search in Office" align="left" color="#336A40"...
Will this really ‘break’ the internet?
[header2 text="What is news?" align="left" color="#336A40" margintop=""] There's nothing worse than accidentally clicking on a daft click-bait link that re-directs you to a dodgy, untrustworthy website. They are all too common, with news you can't trust, and...
What are @Mentions in Office?
How many times,. when you are working on documents with someone else, do you want to ask them a question? "Why did you add (or remove) this section?", "How does this calculation work?" and so on. So, you stop what you are doing, send them an email or make a phone...