Tag Archives: hack

Cyber Terrorism: How Insurance Can Help Mitigate Damages

This entry is part of 24 in the series Data Security

What is Cyber Terrorism?

Cyber terrorism is a politically-motivated attack against computers and data. These attacks are intended to be disruptive and advance the attackers’ political or religious stance. Acts of cyber terrorism result in a total or partial interruption of a computer system. Unlike cyber extortion, the hacker isn’t asking for any sort of ransom in cyber terrorism situations.

Examples of Cyber Terrorism

  • Sophisticated network attacks to gain access to sensitive data and high-value business information
  • Viruses and worms that are maliciously designed to disrupt, damage and attack an electronic infrastructure
  • Hacks to collect personally-identifiable information which can be used to steal identities

(more…)

Common Data Threats and Vulnerabilities

This entry is part 4 of 24 in the series Data Security

When it comes to data security, a threat is any potential danger to information or systems. Threats could be an intruder network through a port on the firewall, a process accessing data in a way that violates the security policy, a tornado wiping out a facility, or an employee making an unintentional mistake that could expose confidential information or destroy a file’s integrity.

It’s critical for every business to understand their risk. An important step in data security is to identify potential threats, classify them by category, and evaluate the damage potential to the company. Use this checklist to understand common data threats and assess how they may affect your business: (more…)

PHISHY PHONE CALLS

This entry is part 19 of 24 in the series Data Security

In the midst of a busy workday, you receive a phone call from an outside number. The caller identifies themselves as a member of tech support calling about your computer. They may request your password, ask you to download a file, or request remote connection to your system. These calls may be phishing attempts and should be considered dangerous – but they can be tricky to identify and it’s important to be prepared to respond appropriately.

Here are 7 helpful tips to deal with phishing: (more…)

Hacked! How to Comply with Data Breach Notification Laws

This entry is part 15 of 24 in the series Data Security

Unfortunately, your business is never 100% protected from data breach crimes, so it’s important to be prepared to respond if you should become a victim. In the event of a data breach, businesses must comply with data breach notification laws. Although data breach notification laws vary by jurisdiction, generally businesses must notify consumers whose personal information has been compromised by a security breach.

Who is required to give notice? (more…)

7 Common Causes of Data Breach

This entry is part 14 of 24 in the series Data Security

Data breach is the exposure of customer information and it is becoming a more common (and frightening) occurrence. Could your business be the next victim, left to face tremendous financial costs, lost customers and lost reputation? Consider these common causes of data breach: (more…)

Protecting Your Business from Costly Data Breach Damage (4/4)

This entry is part 12 of 24 in the series Data Security

Data breach is the exposure of sensitive customer information due to hacking, theft or the accidental release of data. Business owners are expected to be custodians of customer information and have a reasonable expectation to protect their customers’ data. A privacy breach is impactful for all businesses, but it can be devastating for a small business without the resources of a larger corporation. In this four-part blog series, we share the top three data breach myths, eight tips to prevent data breach, how to react to a data breach, and how to protect your business from costly data breach damage.

For 20 days in late 2013, Target Corporation experienced one of the largest data breaches in American history. Hacked information included some 70 million customer names and 40 million credit and debit card numbers including the short verification codes on the back of compromised cards. In addition to forcing the retail giant to book a reported $61 million in direct costs related to the breach, it also scared customers away from shopping at their stores – which resulted in a 46% drop in net profit during the holiday quarter. Although the exact full costs of the breach are not yet known, security analysts have pegged the costs at upwards of $400 million.

A data breach can be even more impactful for a small business and cause irreparable harm to your company’s reputation. The cost of even a small breach can be wildly expensive. Typical costs can include: (more…)