Good practice last year isn’t good enough anymore.
Even cyber-insurance providers are getting more selective before accepting cover, or worse, before paying claims.
With the number of claims skyrocketing insurers are increasingly asking, “What did you do to protect yourself from the obvious and known risk from cyberhackers?”
The levels of protection you put in place 1 or 2 years ago probably aren’t adequate for the threats today. They are evolving so rapidly.
So what can you do?
Hackers aren’t waiting for you to make a decision to put protections in place.
They are spending every waking moment trying to find new ways of stealing your data. They have set themselves up as businesses to do evil. They hire the best and brightest talent, and have the latest tech – simply because it’s worth it. Its organised crime and these guys are the mafia of the modern age.
We see continuous hacks on most of our clients. These are attempts to penetrate their firewalls, or guess their passwords on Office 365. We see fake webpages through phishing attempts, and we see techniques to harvest password reset questions by asking for favourite teachers, or first cars, or favourite band on platforms like FaceBook.
That’s why your cyber-insurance and business continuity insurance providers will be starting to ask more demanding questions when you renew your cover. They are well aware of the risk and they want to know that you have taken all reasonable steps.
You need to be able to reassure them that you have:
- deep endpoint protection
- a penetration and vulnerability assessment
- data governance that is fit for purpose
- awareness programmes for all users and verification
- dark web monitoring
- multi-factor authentication and complex passwords
and so much more – the very items we have included in our KARE for Security services.
The question for you, and your insurer, is what level of protection is appropriate for your organisation so your insurer will cover you if you need to claim? That is why we have two levels of cyber-protection, and, because this isn’t static, it is why we keep investing and researching additional tools to help defend you from harm.
The Hackers are turning up their attacks on you – are you turning up your defences to match?
One quote we saw recently that rang true was:
“A cybercriminal only has to be lucky once, while a defender has to be lucky every minute of every day.”
What’s your next step? We’ve created a simple 9-point checklist to help you navigate the cyber-risk landscape and find the right solution for you.
Improving Kinetics KARE
Major KARE Foundation Updates over the last 12 months At Kinetics, we're committed to continuously enhancing our KARE Foundation offering to better serve your business needs. Security is at the heart of everything we do. In the last 12 months, we've rolled out...
Its the end of the road for Windows 10.
The Final Countdown: Windows 10 Support Ends in a month. Time is running out faster than we'd like to admit. With October 14, 2025 rapidly approaching, we're now in the final countdown for Windows 10 support. If you're still running Windows 10, this isn't just another...
The Rise of AI-Powered Ransomware
Unveiling a dark future: The First AI-Powered Ransomware In a groundbreaking discovery, researchers at ESET have uncovered what they believe to be the first known AI-powered ransomware strain, aptly named PromptLock. This sophisticated malware is not just a step...
AI Revolution Accelerates: August 2025’s Game-Changing Developments
Welcome to our monthly AI news roundup, where we bring you the latest and most exciting developments in the world of artificial intelligence. This month has been packed with groundbreaking announcements, intriguing partnerships, and significant advancements. Sam...
Webinar Replay: Rethinking Endpoint Security: Smarter Strategies for a Safer Business
Cyber-protection keeps getting more complex, more restrictive and more expensive. This month we are talking with expert Thomas Shobbrook. He updates us on the latest security trends and help us understand how well protected your device is out-of-the-box. We ask...
What happened when a client’s client got hacked?
Sometimes the best way to understand cybersecurity isn't through theory, but through real examples. Recently, one of our clients experienced a perfect demonstration of why layered security matters – and how our KARE security suite can stop threats before they cause...
Coming soon to Windows 11 – a new Start Menu
Microsoft offers a glimpse into the future of Windows 11. If you're running the Windows 11 Dev Channel, you’ll likely have noticed a new build hitting your systems: Build 26200.5641. This isn’t a major feature drop, but it’s a solid update packed with improvements,...
GPT5 Has Landed — But Don’t Expect Fireworks (Yet)
OpenAI’s GPT5 just dropped, and as expected, tech circles are buzzing. Improved reasoning! Smoother tone! Even “vibe coding”! But let’s be clear: this isn’t a moon landing. It’s a refined evolution, not a revolution. If GPT4 was the charismatic genius who...
Does Generative AI Still Needs a Human Eye ?
It’s no secret that generative AI tools have become powerful assistants in modern work. From drafting emails and reports to generating insights and summarising complex documents, the productivity gains are real. But there’s a catch. A big one. Generative AI needs a...
July’s AI Headlines: Progress, Problems & Public Concerns
AI re-Investment causes job cuts at Microsoft: Microsoft has announced plans to reduce its workforce by up to 9,000 employees, representing approximately 4% of its global staff, as part of the latest round of job reductions this year. While the company has not...