Cyber Security

Information is stolen in the absence of cyber security protection

Information is stolen during a cyber attack.  This material can be used for ransom and circulation to the public. Your business network is therefore shut down.  Highly sensitive information is hijacked. This data may belong to employees and clients.

Malware includes Trojans, viruses and worms:

Anyone with a social media presence or website is a target therefore for a cyber security attack. The different types of attacks are known broadly as Malware. These include Trojans, viruses and worms.

Trojan-type malware is on the rise

Trojans are spread by some form of social engineering. For example,  a user is duped into executing an email attachment.  This email is disguised to be unsuspicious (e. g. a routine form to be filled in).  Also  by drive-by download (this is a download when visiting a website without a person’s knowledge. Trojan-type malware is on the rise. It accounts for as much as 83% of the global malware detected in the world.

Many modern forms act as a backdoor thereby giving a controller unauthorised access to the affected computer. Trojans do not generally propagate themselves.

Use the most up-to-date security to decrease your system’s weaknesses.

Phishing:

This appears as a request for data from a trusted third party. Most noteworthy users are asked to click on a link and enter their personal data.

Cyber Insurance:

Cyber security insurance covers notification costs, litigation costs, as well as  fines and penalties. Furthermore protection against an attack by an employee in the company.

Everyone is vulnerable to a cyber attack and should thus have cyber security insurance. It is also not expensive if you use CyberPolicy for price comparisons between well known cyber security agencies. If you request a discount, you are most likely to benefit from a discount. On average, a cyber attack costs individual businesses about $38,000 a year.

60% of data is stolen within the first few hours

 Many companies are not actively taking steps to prevent attacks, in certain instances  Cyber security firms can take up to 200 days to detect a breach in security.

A recent Cisco research found that 60% of data is stolen within the first few hours of a security breach.