Ransomware continues to be a major issue for companies regardless of the size. It may be hard to believe, but the reason for this lies with the victims, because the quickest and most often used resolution to the attack is to pay the ransom. While paying the ransom, may resolve a problem for an organization, it encourages cyber criminals to continue the attacks.
As companies had to quickly pivot and implement a remote work plan (a lot of them did not have such a plan in place) due to the ongoing COVID-19 pandemic, they became more at risk for a cyber attack and/or breach due to the vulnerabilities they did not even know they had. As a result of this there has been an uptick in the success rate of cyber attacks in the United States.
Coalition Inc., a cyber insurance provider, recently released their H1 2020 Cyber Insurance Claims report that noted a decrease in the frequency of ransomware claims however, its policyholders have experienced a 100% increase in average demands from 2019 to the first quarter of 2020, then an increase of 47% from the first quarter to the second.1
Most CEOs or CFOs are probably not Cyber Security experts, but are entrusted to ensure the company runs efficiently and profitably. In today’s business IOT world, having a safe and secure network is a large part of keeping the business operational. This includes ensuring that all cyber related risks are minimized as much as the budget will allow. Cyber related issues that threaten the company’s income are scary for sure, but perhaps the most frightening aspect of keeping your network and data secure are the “unknowns” of IT.
As a follow up to our previous article on the subject of Cyber Security During a Pandemic, we thought we’d share with you some of the topics used in phishing scams, so that you are better prepared, should you become the target of one.
Most companies have been forced to quickly implement a remote work solution that suited essential employees or even the entire firm’s staff. This has exposed many companies network to new risks as everyone has a different set up at home. Some are using MACs, some using PCs, some have outdated operating systems and software while others are already infected with viruses or malware.
Topics: Cyber Insurance, Cyber Risk Mitigation, Cyber Security, Phishing Scam, Risk management, Risk Mitigation, Total Cost of Risk (TCoR), cyber attacks, what is total cost of risk, ceo scams, cfo scams, ceo fraud, what is risk management
When most businesses think cyber crime, they imagine brute force threats from foreign agents or highly advanced hacker teams. Executives tend to think that external forces well beyond their control make up the vast majority of security loopholes.
What does the new order do?
On May 11th 2017, President Trump issued the new, signed cyber security executive order that demands each federal agency and department head will be held accountable for cyber security risk to their enterprises; an initiative to better protect the federal government's critical data and systems. It outlines the cyber-risk reporting requirements that they must adhere to and names the framework that they'll use as the standard.
The cyber security world evolves at a breakneck pace. For those not following closely, new developments can be unexpected and downright scary.
Multiple sources reported yesterday that hackers encrypted files on computers belonging to the city of Newark and have demanded $30,000 worth of Bitcoin to restore them.