Download the Cyber Liability Guide
For decades, Roger J. Stewart has been helping businesses throughout the United States customize their insurance coverage, mitigate their risk, and preserve their legacy.
Roger understands the urgent needs of small to large businesses and is ready to represent your needs.
Select a date on the calendar to schedule a time.
Call or Text 858-754-0081 to engage now.
Download Now
Please share your email to receive your download link >>
Cybercrimes target both individuals and businesses. The results of cyber-hacking can be as minor as a pesky popup that has to be removed by your IT department to malware that destroys your entire organization’s ability to do business. Cyber hackers can steal data, hijack and hold ransom entire software systems or break-in and alter files, using legitimate devices to lure others into revealing sensitive information, or worse, send money at the behest of a trusted fellow employee. Whatever the scope of the attack, cyber threats affect everything from productivity to data to credibility with your customers. Protecting against Cybercrimes should be a priority for every business, however large or small.
The right controls, internal checks, and protocols can stop an attack before it starts. Here are 6 things you can do to protect your company BEFORE a cyber incident occurs.
Connect to the internet over secure, password-protected networks: this means every employee working from home needs access to a VPN.
Be suspicious of, and immediately discard, emails from unknown sources or those with attachments that are not logical.
Look at the sender email carefully: just because the name sounds familiar doesn’t mean it is actually from that person.
Type a URL by hand instead of clicking a link.
Legitimate organizations never ask for your PIN, password, or other personally identifiable information. If it seems like it’s coming from IT, call over to the person you know and ask if it is them (it’s not).
Even smart people fall for scams, be vigilant, logical, and ask other people if you have doubts.
Update anti-virus software.
Perform a scan of your entire system.
Install all of the appropriate patches to fix known vulnerabilities.
Notify your company’s IT department immediately.
If all your company’s vigilance has not protected you and you are a victim of a cyber attack, the actions you take upon uncovering the incursion are crucial. The first step you must take is to disconnect your device from the internet and perform a full system restore. Your cyber liability will be must better confined to only the infected machine by taking this first, important step.
Corporate Cyber Security Protocols will vary slightly between organizations. If your organization does not have a Cyber Security Protocol, the recent attack will likely spur that action internally. If you have addressed the vulnerabilities and are certain that the threat has been contained, the final steps are to:
If your Personally Identifiable Information (PII) was compromised, take action to ensure that your identity is not stolen.
Webinar Series / Hear From the Experts
Learn Cyber Best Practices From IOA Practice Leader >> Watch Now <<
When data breaches and hacks occur, they can result in devastating damage, such as business disruptions, revenue loss, and legal fees. No organization is immune to the impact of cyber crime, and cyber liability insurance is a crucial part of risk management. Using our Cyber Risk Exposure Scorecard, organizations can assess their level of risk and better determine the level of coverage they need. Want a taste of the full Cyber Scorecard? Take our abbreviated Cyber Assessment here: