Most CEOs or CFOs are probably not Cyber Security experts, but are entrusted to ensure the company runs efficiently and profitably. In today’s business IOT world, having a safe and secure network is a large part of keeping the business operational. This includes ensuring that all cyber related risks are minimized as much as the budget will allow. Cyber related issues that threaten the company’s income are scary for sure, but perhaps the most frightening aspect of keeping your network and data secure are the “unknowns” of IT.
As a follow up to our previous article on the subject of Cyber Security During a Pandemic, we thought we’d share with you some of the topics used in phishing scams, so that you are better prepared, should you become the target of one.
Most companies have been forced to quickly implement a remote work solution that suited essential employees or even the entire firm’s staff. This has exposed many companies network to new risks as everyone has a different set up at home. Some are using MACs, some using PCs, some have outdated operating systems and software while others are already infected with viruses or malware.
Topics: Cyber Insurance, Cyber Risk Mitigation, Cyber Security, Phishing Scam, Risk management, Risk Mitigation, Total Cost of Risk (TCoR), cyber attacks, what is total cost of risk, ceo scams, cfo scams, ceo fraud, what is risk management
When most businesses think cyber crime, they imagine brute force threats from foreign agents or highly advanced hacker teams. Executives tend to think that external forces well beyond their control make up the vast majority of security loopholes.
What does the new order do?
On May 11th 2017, President Trump issued the new, signed cyber security executive order that demands each federal agency and department head will be held accountable for cyber security risk to their enterprises; an initiative to better protect the federal government's critical data and systems. It outlines the cyber-risk reporting requirements that they must adhere to and names the framework that they'll use as the standard.
The cyber security world evolves at a breakneck pace. For those not following closely, new developments can be unexpected and downright scary.
Multiple sources reported yesterday that hackers encrypted files on computers belonging to the city of Newark and have demanded $30,000 worth of Bitcoin to restore them.
Ransomware strikes. Your critical data files have been encrypted and your business grinds to a halt. Do you:
a) spend countless hours rebuilding from backups (if you were diligent enough to ensure they'll work) or
b) pay the perpetrator to unlock your files?
Now that ransomware is spreading like wildfire through malicious emails, "malvertising" campaigns, and exploit kits, many firms and individuals face this exact scenario.
Last month, Risk.net, a UK-based website that covers operations risk at financial services firms, released its list of top 10 operational risks for 2017. It's no surprise that financial services companies face many of the same risks that businesses in all industries face.
So what are those top three risks and how can organizations combat them?