Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Spear-Phishing (aka Whaling)
There's yet another new, and nasty, 'phishing' attack doing the rounds. We've heard it called SpearPhishing, or Whaling. Here's how it works. The villains research the name of your CEO and your accountant/CFO. This is often just a matter of looking on your website...
Cyber Security Breaches
There's a lot of interest in cyber security this week - from client business cellphones going missing, 'crypto-locker' scares on office PCs and over the last few days - enquiries stemming from new business insurance cyber-security products. We noticed an article...
Sponsoring Malaghan Institute
Kinetics Group is proud to be a Lab Partner for the Malaghan Institute. The Malaghan Institute is New Zealand’s leading medical research institute focused on finding cures for cancer, asthma and allergy, multiple sclerosis and infectious disease. Based at Victoria...
Windows 10 – Coming Soon!
Windows 10 is coming soon - barely a month to go, (July 29) and we've been testing the early builds extensively. [header2 text="Firstly, is it really free?" align="left" color="#00cfef" margintop=""] The answer is that if you have a current license of Windows 7, 8 or...
Dangerous Load (in eMail)
There's an epidemic of emails floating around right now, and even the best anti-Virus and anti-Spam are letting them through. The most common one today simply says 'Invoices' and it contains a ZIP file that it encourages you to open. [header2 text="Don't pass go -...
Offline Maps on your Phone
News today is that Offline maps are coming to Google Maps - the ability to download a map of an area before you head away - particularly useful if you are travelling somewhere where there is poor mobile coverage or expensive roaming rates. Of course, if you have an...
Introducing Office Remote
Some of the best cool tools sneak out under the radar, and Microsoft Office Remote is one. It's fantastic! It lets you run presentations remotely from your phone. Yes, we know there have always been tools like this around, but Office Remote is better - it fits...
Ciao Lync, Hi Skype For Business
As we mentioned a few weeks ago, Lync is becoming Skype for Business. That's all happening this week! April 14th is the big day - we expect that's a USA date so in practical terms it's this Wednesday. Office 365 users should see the change roll out automatically,...
Easter Eggs aren’t always chocolate
Computer folk love to hide secret 'features' in their code. Normally we reckon these are bugs. But sometimes they are just fun. They are just hidden gems that add a bit of fun, and they're called Easter Eggs. There is a fine tradition of these in popular games,...
A new look for Kinetics
[header2 text="We've listened!" align="center" color="#3ec940" margintop=""] Our client's have told us they love what we do, but our brand is tired. So we're changing it. We've refreshed our logo, and our website - and over the next few weeks we'll work through all...