As a small business owner, you work long and hard to make sure your business is successful. Small businesses are the most common victims of fraud at 31.8% according to the Association of Certified Fraud Examiners. That number is higher than any other business category. The truth is that small businesses are the most vulnerable because they often lack internal controls to curb the effect of scams on their bottom line. So, how can you protect your business from scammers? The first step is to identify the common red flags that accompany a scam and then educate your employees on how to spot them. Below we dive into one of the most common types – overpayment scams – and how to mitigate them.
(more…)Archives
Protect Your Business From 3 Common Bitcoin Email Scams
In the digital age, bitcoin is a well-known term – but that doesn’t mean it’s well understood. What is cryptocurrency? According to Cointelegraph, “cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency.” It is decentralized and relies on an open source verification system. In essence, it’s worth fluctuates and it is virtually untraceable. The most widely used and recognized cryptocurrency is bitcoin. So, what does this have to do with your business?
(more…)Cyber Terrorism: How Insurance Can Help Mitigate Damages
What is Cyber Terrorism?
Cyber terrorism is a politically-motivated attack against computers and data. These attacks are intended to be disruptive and advance the attackers’ political or religious stance. Acts of cyber terrorism result in a total or partial interruption of a computer system. Unlike cyber extortion, the hacker isn’t asking for any sort of ransom in cyber terrorism situations.
Examples of Cyber Terrorism
- Sophisticated network attacks to gain access to sensitive data and high-value business information
- Viruses and worms that are maliciously designed to disrupt, damage and attack an electronic infrastructure
- Hacks to collect personally-identifiable information which can be used to steal identities
Cyber Liability Insurance – Network Asset Protection Coverage (Video)
Data Breach and Your Damaged Reputation
Cyber Liability Insurance – Security and Privacy Liability Coverage
Common Data Threats and Vulnerabilities
It’s critical for every business to understand their risk. An important step in data security is to identify potential threats, classify them by category, and evaluate the damage potential to the company. Use this checklist to understand common data threats and assess how they may affect your business: (more…)
PCI DSS Compliance and Cyber Liability Insurance
Did you also know that banks and credit card companies can impose fines and penalties on your business if you fail to maintain these requirements? (more…)
Cyber Liability Insurance – Privacy Breach Response Coverage (Video)
Upgrade Your Internet Security: Risky Cyber Behaviors to Avoid
Below are five of the most common data security mistakes leading to data breaches. Employees should halt these practices immediately to reduce the likelihood of a breach.