Tag: Cyber Attacks

Are You Prepared for a Cyber Attack?

Unlike physical threats that prompt immediate action—like stopping, dropping and rolling if you catch on fire— a cyber attack (threat) is often difficult to identify and understand. Download the PDF version Design © 2020 www.MyTPG.com All rights reserved. Cyber threats include dangers such as viruses erasing entire systems, intruders breaking into systems and altering files, intruders using your computer or device to attack others and intruders stealing confidential information. The spectrum of cyber risks is limitless; threats, some more serious and sophisticated than others, can have wide-ranging effects on the individual, community, organizational and national levels. Before a Cyber Attack You can increase your chances of avoiding cyber risks by setting up the proper controls. The following are things you can do to protect yourself, your family and your property before a cyber incident occurs: Only connect to the internet over secure, password-protected networks. Do not click on links or pop-ups, open attachments or respond to emails from strangers. Always enter a URL by hand instead of following links if you are unsure of the sender. Do not respond to online requests for personally identifiable information (PII). Most organizations—such as banks, universities and businesses—will never ask for your personal information over the internet. Limit who you are sharing information with by reviewing the privacy settings on your social media accounts. Trust your instincts. If you think an offer is too good to be true, it probably is. Password-protect all devices that connect to the internet and all user accounts. Do not use the same password twice—choose a password that means something to you and you only. Change your passwords on a regular basis (every 90 days or so). If you see something suspicious, report it to the proper authorities. During a Cyber Attack Here are some of the steps you should take during a cyber attack: Immediate Actions Check to make sure the software on all of your systems is up to date. Run a scan to make sure your system is not infected or acting suspiciously. If you find a problem, disconnect your device from the internet and perform a full system restore. At Home Disconnect your device (e.g., computers, gaming systems or tablets) from the internet. By removing the internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files, or using your device to attack others. If you have anti-virus software installed on your computer, update the virus definitions, if possible, and perform a manual scan of your entire system. Install all of the appropriate patches to fix known vulnerabilities. At Work If you have access to an IT department, contact someone in it immediately. The sooner someone can investigate and clean your computer, the less damage to your computer and other computers on the network. If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity. Public Locations Immediately inform a manager or authority figure in charge. If someone has access to an IT department, contact the department immediately. After a Cyber Attack File a report with the local police so there is an official record of the incident. Report online crime or fraud to the Internet Crime Compliant Center (IC3) or the federal government’s internet fraud resource website. Report identity theft to the Federal Trade Commission. If your PII was compromised, consider other information that may be at risk. Depending what information was stolen, you may need to contact other agencies. You should also contact your state’s DMV for transportation if your driver’s license or car registration has been stolen. More About PIIPII is information that can be used to uniquely identify, contact or locate a single person. PII includes but is not limited to: Full name Social security number Address Date of birth Place of birth Driver’s licence number Vehicle registration plate number Credit card numbers Physical appearance Gender or race Take these steps if you believe your PII has been compromised: Immediately change all passwords, and change your financial passwords first. If you used the same password for multiple resources, make sure to change it for each account, and do not use that password in the future. If you believe the compromise was caused by malicious code, disconnect your computer from the internet. Restart your computer in safe mode and perform a full system restore. Contact businesses, including banks, where you have accounts, as well as credit reporting companies. Close any accounts that may have been compromised. Watch for any unexplainable or unauthorized charges to your accounts. In addition to insuring your home, TPG Insurance Services is committed to helping you and your loved ones stay safe when disaster strikes. If you would like more information on how to protect yourself from a cyber attack, please contact us at 909-466-7876 or www.MyTPG.com today. Download the PDF version […]

Read More… from Are You Prepared for a Cyber Attack?

Cyber Liability: Cyber Security for Small Businesses Featured

High-profile cyber-attacks on companies such as Target and Sears have raised awareness of the growing threat of cyber-crime. Recent surveys conducted by the Small Business Authority, Symantec, Kaspersky Lab and the National Cybersecurity Alliance suggest that many small business owners are still operating under a false sense of cyber security. Download the PDF version This Cyber Risks & Liabilities document is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. © 2012, 2014 MyTPG.com. All rights reserved. The statistics of these studies are grim; most U.S. small businesses lack a formal internet security policy for employees, and only about half have even rudimentary cyber security measures in place. Furthermore, only about a quarter of small business owners have had an outside party test their computer systems to ensure they are hacker proof, and nearly 40% do not have their data backed up in more than one location. Don’t Equate Small with Safe Despite significant cyber security exposures, 85% of small business owners believe their company is safe from hackers, viruses, malware or a data breach. This disconnect is largely due to the widespread, albeit mistaken, belief that small businesses are unlikely targets for cyber-attacks. Data thieves are simply looking for the path of least resistance. Symantec’s study found that 43% of attacks are against organizations with fewer than 250 employees. Outside sources like hackers aren’t the only way your company can be attacked—often, smaller companies have a family-like atmosphere and put too much trust in their employees. This can lead to complacency, which is exactly what a disgruntled or recently fired employee needs to execute an attack on the business. Attacks Could Destroy Your Business As large companies continue to get serious about data security, small businesses are becoming increasingly attractive targets—and the results are often devastating for small business owners. According to a recent study by the Ponemon Institute, the average annual cost of cyber-attacks for small and medium-sized businesses is over $2 million. Most small businesses don’t have that kind of money lying around, and as a result, nearly 60% of small businesses victimized by a cyber-attack close permanently within six months of the attack. Many of these businesses put off making necessary improvements to their cyber security protocols until it was too late because they feared the costs would be prohibitive. 10 Ways to Prevent Cyber Attacks Even if you don’t currently have the resources to bring in an outside expert to test your computer systems and make security recommendations, there are simple, economical steps you can take to reduce your risk of falling victim to a costly cyber-attack: Train employees in cyber security principles. Install, use and regularly update antivirus and antispyware software on every computer used in your business. Use a firewall for your internet connection. Download and install software updates for your operating systems and applications as they become available. Make backup copies of important business data and information. Control physical access to your computers and network components. Secure your Wi-Fi networks. If you have a Wi-Fi network for your workplace, make sure it is secure and hidden. Require individual user accounts for each employee. Limit employee access to data and information, and limit authority to install software. Regularly change passwords. In addition to the listed tips, the Federal Communications Commission (FCC) provides a tool for small businesses that can create and save a custom cyber security plan for your company, choosing from a menu of expert advice to address your specific business needs and concerns. It can be found at www.fcc.gov/cyberplanner. Your Emerging Technology Partner A data breach could cripple your small business, costing you thousands or millions of dollars in lost sales and/or damages. We have the tools necessary to ensure you have the proper coverage to protect your company against losses from cyber-attacks. Contact us today to for additional cyber risk management guidance and insurance solutions. Download the PDF version […]

Read More… from Cyber Liability: Cyber Security for Small Businesses Featured