Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Microsoft Office competency testing
[header2 text=" How do you know your staff skill level with Microsoft Office? " align="left" color="#336A40" margintop=""] Measuring the productivity of chickens is easy … you just count the eggs. Measuring productivity of those using Microsoft Office is much...
Reduce email clutter…
[header2 text=" Reduce email clutter and improve communication with Microsoft Teams" align="left" color="#336A40" margintop=""] Microsoft have introduced ‘Teams’ into Office365. It is a new application that’s included in most commercial Office365 plans. The concept...
Password expiry SOLVED
[header2 text="Ensure password expiry notifications get actioned" align="left" color="#336A40" margintop=""] These days it seems everyone has multiple devices. Desktops, tablet’s, smart phones, iPad and Surfaces. With more choices of what we work on, we have more...
Kinetics are Triple Finalists in the 2017 Microsoft Partner Awards
[header2 text="Punching above our weight" align="left" color="#336A40" margintop=""] Kinetics Group is proud to be selected as a finalist in three categories for the Microsoft 2017 Partner Awards - 'Small & Midmarket Cloud Solutions', 'Cloud Productivity' and...
Jacobsen
"Kinetics brought a large pool of knowledge across a broad range of companies and markets that assisted us to reduce the time to market of solutions and infrastructure implementations." - Truby Gravatt, IT Manager IT Review Identifying gaps vs best...
This week’s social engineering hack
The latest attempt to trick you into opening an infected document. Includes swearing and then a new enticing warning message. Today I received this message (I have edited out the swear word.) yea , we finally did it. here is the bank confirmation:...
Office365 Updates
There's nothing like seeing the computer display hall at MOTAT to be reminded of how much things change and how quickly. One of the sayings I heard late last year was that never in history has business has never changed faster than now, and yet it will never change...
Cloud could be a waste of time…
[header2 text="Unless cloud changes how you operate, you are missing the point" align="left" color="#336A40" margintop=""] Is the Cloud helping you drive your bottom line - Are you doing the same stuff the same way or using the cloud to do new things better? The cloud...
Cryptostopper!?
[header2 text="CryptoStopper!?" align="left" color="#336A40" margintop=""] That’s right, a CryptoLocker Stopper. [header2 text="Is there really such a thing?" align="left" color="#336A40" margintop=""] It appears so, at least for some forms of the beast. This amazing...
Update : Spearphishing is now much more aggressive
By now, most of our followers will know what spearphishing is - we've posted before about it [header2 text="Spearphishing just stepped up a notch and no one is immune." align="left" color="#336A40" margintop=""] Most of our client's have now experienced an attack, but...