1
YOUR CYBER SECURITY
Ben Goodall – PSC Griffiths Goodall, Managing Principal Nathaniel Barrs – PSC Insurance Group, Director of Operations 19 May 2020
YOUR CYBER SECURITY Ben Goodall PSC Griffiths Goodall, Managing - - PowerPoint PPT Presentation
YOUR CYBER SECURITY Ben Goodall PSC Griffiths Goodall, Managing Principal Nathaniel Barrs PSC Insurance Group, Director of Operations 19 May 2020 1 Agenda for Today Todays Environment Covid-19 Influences Types of Cyber
1
Ben Goodall – PSC Griffiths Goodall, Managing Principal Nathaniel Barrs – PSC Insurance Group, Director of Operations 19 May 2020
2
– Risk Management Strategies – Technical Considerations – Communication Apps
circumstances or needs. You should always consider any PDS wordings prior to making a decision on purchasing insurance products. We refer you to our financial services guide which contains details of our services and how we are remunerated.
3
4
as a result of COVID-19 could be leaving many organisations vulnerable to attack by threat actors rushing to exploit the situation.
– increased risk of cyber-crime, where criminals will look to exploit changes to business environments to extract funds or personal information from employees; and – risk of employees inadvertently disclosing personal information through using unfamiliar document storage and conference platforms.
100 reports of Coronavirus scams in the last three months, and the volumes continue to rise substantially.
5
downloads malware.
Australian Government. These messages encourage people to click the link to access testing locations near them. If the link is clicked, the phone is redirected to a website where cyber criminals will download malware, or a computer virus onto the phone. In this particular scam the criminals attempt to steal banking credentials when the user logs-in, providing access to the user’s money.
supplier and authorise things such as a payment or a change of bank account prior to a large payment or something similar
6
Staff can and sometimes do procure intellectual property from your business for future unauthorised use – Client lists – Patents – Price lists – Intellectual Property – Privacy Obligations to Your Clients There is an increased risk of unauthorised access of this information when staff are working remotely and unsupervised
7
Example – Employee Error An internal employee for an organisation accidentally attached the wrong file when sending an email to four job applicants. The file included HR demographic data consisting of former employee names, addresses and personal info. Below is the summary of the costs and insurers breakdown.
Privacy Liability - mismanagement of personal and/or corporate confidential information, violation of company privacy policy:
$100,000
$250,000 Incident Response Expenses:
$7,000
$5,000
$28,000
$25,000 Total Cost: $415,000
8
Example – Ransomware An insured’s server and client records (law firm) were locked by an attack via ransomware. Insured and insurer were only able to have the records released after a $50,000 ransom was paid to hackers.
Extortion and network interruption: – Ransom payment $50,000
$75,000
$150,000 – Legal Costs $11,000 Total Cost: $286,000
9
Example – Push Payment System is breached by a hacker who is monitoring outgoing invoices they…..
information via social engineering
Financial Impacts
$700,000
$10,000 Total Cost: $710,000
Non Financial Costs Reputational, Insurer Negotiations for settlement, Confidence Impacts on Business
10
Source - CFC Underwriting, London
11
systems used to hold sensitive data (e.g. payroll systems, HR systems or client management systems).
requirements for all remote access sessions.
removing open RDP ports and implementing secure VPN connections where possible.
the most up-to-date security patches
12
configurations ahead of time to determine if there are any unanticipated gaps.
privileges on those accounts to only those who require it to perform their role.
especially while working from home. Encourage employees to call the sender if they have the slightest doubt about the authenticity of an email.
detecting socially-engineered messages, recognising a phishing email or SMS.
13
14
Do’s
Don’ts
reason for a third-party to require your login credentials)
15
Applications - checking what security is offered by the application provider a) is multi-factor authentication offered? b) Is end-to-end encryption offered? c) Does the provider keep any metadata from your conferences (or other data)? d) If data is collected, how is it used?; Reading the provider's terms and conditions to check your organisation's rights and the provider's obligations; Video Conference– what security is in place a) ensure your organisation has the latest security and software updates installed for the tele/video conferencing facility you use; b) Hold tele/video conferences in private rooms, not shared spaces (not a technical solution more an operational caution) c) Password protect access to your tele/videoconferences; d) Allowing only invited participants to join tele/videoconferences; (lock down participants) e) And ensuring invitations are sent to the right people and only those attend Lastly ensure your IT team complete a full review of all systems, servers, routers, firewalls and application to ensure you are aware of exposures/gaps and in turn are prepared to respond ahead of time
16
Cyber criminals are seeking to exploit the popularity of communication applications including
intelligence suggests that no one particular application is being targeted, which means that all applications should be carefully reviewed. Rules to follow:
nature of their revenue generation (advertising) they are more open source.
browsing, etc. (open to post scanning).
your business and educate staff with risks previous, current and potential.
17
1. Take extra care if they receive emails and files from unknown senders, particularly if they contain special deals or discount offers; 2. Educate staff on how to identify suspect emails 3. Don’t accept meeting request from unknown sources 4. Use headphones rather than speakers to prevent others listening in to phone calls 5. If in doubt don’t open or attend, call the sender to confirm Remember there was never a Denial of Service attack using a telephone.
18
management solutions to stay ahead of cyber risk. Insurance helps safeguard against data breaches, hacking, employee error and more.
19
What’s covered?
Notification, Navigating Penalties, liabilities)
20
recovery costs, ransom payments, forensic investigations etc.
These can amount to $1.7 million.
result of a data privacy breach / data theft.
services for affected parties.
with formal investigations by authorities.
damage to a company’s brand as a result of a cyber-attack.
intellectual property
and awareness.
21
What Next… Copy of Presentation: www.pscggib.com.au Any Questions bgoodall@pscggib.com.au or nbarrs@pscinsurancegroup.com.au What To Do If You Have a Cyber Attack/Incident Our Team will reach out to discuss your individual Cyber needs