“Oh sure, I have heard of cyber attacks but that’s not going to happen to me. I have my data protected. I don’t need a cyber policy. I am already paying plenty of premiums for all my other polices!”
As a senior claims advocate, I see the number of cyber attacks increasing every week as more clients call in to report that their information is being held for ransom. Unfortunately more times than not, clients find out there is no coverage on their current policies until after it is too late.
The head of mobile research from Prey, Inc.’s, Nicolas Poggi, compiled the below statistics.
Scary statistics, right? So, what are some practical ways to protect yourself and your data? Below are some recommendations from Travelers.
Some other recommendations include using a virtual data room (VDR) when dealing with highly sensitive information (mergers and acquisition). Think of a VDR as an online room that is used in place of a physically secured room in order to share and review highly sensitive data. Another is utilizing a virtual private network when you are traveling or working remotely. With Wi-Fi access granted by almost any business, it creates a loophole for attackers to sneak in and create damage.
Interesting fact about June bugs is that the larva will feed underground up to 3 years prior to emerging. In the same way, there may be embedded issues with your system long before it is made evident. Let the June bug remind you to take action against those harmful computer bug before it becomes stink bugs because it will really stink when sensitive information falls into the wrong hands.
Ausustyn, A., Bauer, P., Duignan, B., Eldridge, A., Gregersen, E., Luebering, J.E., McKenna, A., …Zelazko, A. (1998). June beetle. In Encyclopedia Britannica. Retrieved from https://www.britannica.com/animal/June-beetle
Nwazor, Toby. (2017, January). Why your business absolutely needs a virtual data room. Accessed on May 28, 2019. Retrieved from https://www.entrepreneur.com/article/287709
Poggi, Nicolas. (2018 August). 24 Cybersecurity statistics that matter in 2019. Accessed on June 1, 2019. Retrieved from https://preyproject.com/blog/en/24-cybersecurity-statistics-that-matter-in-2019/
Travelers. 11 Steps to help protect your business from cyber extortion. Accessed May 30, 2019. Retrieved from https://www.travelers.com/resources/cyber-security/11-steps-to-help-protect-your-business-from-cyber-extortion