Archives

Overpayment Scam: Protect Your Business from Scammers

This entry is part of 33 in the series Data Security

As a small business owner, you work long and hard to make sure your business is successful. Small businesses are the most common victims of fraud at 31.8% according to the Association of Certified Fraud Examiners. That number is higher than any other business category. The truth is that small businesses are the most vulnerable because they often lack internal controls to curb the effect of scams on their bottom line. So, how can you protect your business from scammers? The first step is to identify the common red flags that accompany a scam and then educate your employees on how to spot them. Below we dive into one of the most common types – overpayment scams – and how to mitigate them.

(more…)

Protect Your Business From 3 Common Bitcoin Email Scams

This entry is part 1 of 33 in the series Data Security

In the digital age, bitcoin is a well-known term – but that doesn’t mean it’s well understood. What is cryptocurrency? According to Cointelegraph, “cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency.” It is decentralized and relies on an open source verification system. In essence, it’s worth fluctuates and it is virtually untraceable. The most widely used and recognized cryptocurrency is bitcoin. So, what does this have to do with your business?

(more…)

Cyber Terrorism: How Insurance Can Help Mitigate Damages

This entry is part 2 of 33 in the series Data Security

What is Cyber Terrorism?

Cyber terrorism is a politically-motivated attack against computers and data. These attacks are intended to be disruptive and advance the attackers’ political or religious stance. Acts of cyber terrorism result in a total or partial interruption of a computer system. Unlike cyber extortion, the hacker isn’t asking for any sort of ransom in cyber terrorism situations.

Examples of Cyber Terrorism

  • Sophisticated network attacks to gain access to sensitive data and high-value business information
  • Viruses and worms that are maliciously designed to disrupt, damage and attack an electronic infrastructure
  • Hacks to collect personally-identifiable information which can be used to steal identities

(more…)

Cyber Liability Insurance – Network Asset Protection Coverage (Video)

This entry is part 3 of 33 in the series Data Security

Electronic data is an important component of your business operations. What would happen if you suddenly lost access to this information? Would you be prepared for the cost associated with recovering your computer network assets? (more…)

Data Breach and Your Damaged Reputation

This entry is part 4 of 33 in the series Data Security

It is no secret that criminals are getting smarter at using technology to their advantage.  Unfortunately, that means your business could be the victim of a data breach left to face tremendous financial costs, lost customers and a damaged reputation. When word gets out that data was compromised at your business, it may take time to convince customers that it is safe to come back. (more…)

Cyber Liability Insurance – Security and Privacy Liability Coverage

This entry is part 5 of 33 in the series Data Security

If your business suffers a data breach, you may see yourself as the victim. But there could be a different perspective for customers or employees whose data has been compromised. They may view you, the business owner, as responsible for not properly safeguarding their confidential information. Would your business be prepared for the related lawsuits? (more…)

Common Data Threats and Vulnerabilities

This entry is part 6 of 33 in the series Data Security

When it comes to data security, a threat is any potential danger to information or systems. Threats could be an intruder network through a port on the firewall, a process accessing data in a way that violates the security policy, a tornado wiping out a facility, or an employee making an unintentional mistake that could expose confidential information or destroy a file’s integrity.

It’s critical for every business to understand their risk. An important step in data security is to identify potential threats, classify them by category, and evaluate the damage potential to the company. Use this checklist to understand common data threats and assess how they may affect your business: (more…)

PCI DSS Compliance and Cyber Liability Insurance

This entry is part 7 of 33 in the series Data Security

Did you know that businesses are required to implement a set of security standards to protect credit card data?

Did you also know that banks and credit card companies can impose fines and penalties on your business if you fail to maintain these requirements? (more…)

Cyber Liability Insurance – Privacy Breach Response Coverage (Video)

This entry is part 8 of 33 in the series Data Security

A privacy breach that exposes sensitive customer information can be high-impact for all businesses. But it can be especially devastating for a small business, causing significant financial strain and irreparable harm to your reputation. So, what are the odds of a breach happening at your business? (more…)

Upgrade Your Internet Security: Risky Cyber Behaviors to Avoid

This entry is part 9 of 33 in the series Data Security

Every business has an expectation to protect sensitive information, and every employee plays a key role in preventing cybersecurity incidents.

Below are five of the most common data security mistakes leading to data breaches. Employees should halt these practices immediately to reduce the likelihood of a breach.

(more…)