iStock 869149492

It’s time to include Multi-Factor Authentication into your protection plan.

Many insurance carriers are starting to require strict safeguards that a company must have in place to even receive a quote on cyber insurance. One minimum requirement is Multi-Factor Authentication (MFA). Many carriers will consider it too risky to provide coverage if it’s not included in your network protection plan.

Here’s why you should consider MFA to protect your network.

  • It’s a mechanism that adds an additional layer of protection to your network.
  • It requires any user to provide multiple credentials to confirm his or her identity.
  • Most carriers now want to see MFA being implemented to authenticate remote networks, administrative access, and remote access to email.
  • Incorporating these controls will reduce the possibility of a network security breach by a compromised password, limit broader access to a hacked network, and lessens the potential for unauthorized access to company email accounts.

If you’re a small and/or medium-sized company MFA is a great way to reduce risk. Talk to your IT partners about how to implement MFA in your business to help ensure that your network stays safe and to qualify for cyber insurance coverage.

For any questions you have about cyber insurance coverage, please reach out to a Prewitt Group representative for additional information.

How to Prepare Your Business for Disaster

Did you know that 40 percent of businesses fail to reopen following a disaster? According to a report from the Federal Emergency Management Agency (FEMA), another 25 percent of businesses fail within a year following a disaster. From natural disasters to cyberattacks, your business is at risk of facing downtime following an unfortunate event. In fact, more than 50 percent of companies experienced a downtime event in the past five years that last longer than a full workday.

Recovering from any disaster can be expensive and burdensome to your business, so it’s important to be prepared for emergency expenses and protect your assets with insurance. The saying, “Time is money” certainly applies in business, so minimizing downtime in case of an emergency is imperative.

Prepare for emergency expenses by:

  • Identifying your monthly financial obligations.
  • Creating an emergency fund to purchase supplies or equipment.
  • Having a credit card or line of credit available.
  • Establishing a payroll policy for during and after a disaster.
  • Establish clear strategies for controlling costs in a disaster situation.

Protect your assets with insurance: Meet with an insurance consultant to make sure you have the proper coverage for the disasters and risks your business faces. If you already have policies in place, review them with your insurance consultant to make sure you understand your deductibles, the limits of your insurance and the nature of your coverage. After all, there are many different types of coverage, all of which are subject to limitations and exclusions. For instance, some policies do not cover flood or earthquake damage, so you may need additional protection. In today’s world, you may want to consider obtaining cyber insurance to protect your business from data breaches and cyber-attacks. The Prewitt Group offers various commercial coverages including commercial property, commercial umbrella, boiler and machinery, business automobile and more.

All in all, when it comes to emergency preparedness, focus on prevention and protection. Effective preparedness can benefit the recovery process. It’s important to assess your risks and take steps to minimize damage and downtime.

Cybersecurity While Traveling

Traveling this summer? Whether it is for business or pleasure, traveling makes you a prime target for cybercriminals.

In fact, IBM Security reported that “the transportation industry has become a priority target for cybercriminals as the second-most attacked industry—up from tenth in 2017.” Plus, a new survey revealed that 70 percent of travelers are engaging in high-risk behaviors while on the road. These risky behaviors include connecting to public WiFi, using a public USB station to charge a device, or enabling auto-connect on your devices.

While our mobile devices provide convenience while traveling, they also expose travelers to cyber threats. So, it is up to travelers to be aware and protect themselves from cybercrime. As you travel this summer, keep these do’s and don’ts in mind:

Do:

  • Update your mobile software. Keep your operating system software and apps updated to improve your device’s ability to defend against malware.
  • Back up your information. Back up your contacts, photos, videos and other data with another device or cloud service before traveling.
  • Think before you click. Use caution when downloading or clicking on any unknown links, delete emails that are suspicious or are from unknown sources and review the details of an application before installing.
  • Pack a backup battery: Cybercriminals can hijack public USB connections to download data from your phone or install malware without your knowledge. Bring your own battery bank to recharge your phone when you’re low or use traditional wall plugs instead of USB ports.
  • Protect your mobile device. Because our mobile devices store so much personal information, it’s vital to keep them secured while traveling to prevent theft and unauthorized access or loss of sensitive information.

Don’t:

  • Share your location. Many apps and devices use geotagging and location sharing to broadcast your location publicly. Make sure that these settings are off to prevent criminals from knowing where you are.
  • Trust public Wi-Fi. Many public places, resorts and hotels offer free Wi-Fi networks. These are usually not very secure and can allow cyber criminals access to your Internet-enabled devices. When connecting to free Wi-Fi, avoid doing any online banking or shopping while on a public network.
  • Leave your device unlocked. Locking your device with a strong PIN, password, or fingerprint ID will help keep your data safe.
  • Post your location on social media. Checking in to places that you are visiting, posting updates mentioning your location or sharing photos from your journey compromise your privacy. Be careful about what you share and double check your privacy settings on social media sites to make sure strangers can’t see your posts.

Ultimately, the more we travel, the more cyber risks we face, but you can minimize the risk by following these guidelines.

iStock 898760650

Have you stopped to think about the risks your business faces this year? Among other risks, cyber threats remain a high-ranking concern across businesses of all sizes and industries—especially those in technology, banking and professional services sectors.

In 2018, cybersecurity threats grew from small, local attacks to attacks causing disorder on a massive scale. Consequently, it’s critical to be informed of cyber security trends and prepared to prevent cyber attacks in 2019.  Risk Management Magazine reports that the “massive gap between confidence and key fundamental preparation may itself pose a risk.”

Recently, Chubb announced 3 key cybersecurity trends to watch this year:

  1. “Cybersecurity regulation and enforcement will increase and focus more on actions taken by businesses pre-incident, in addition to post-incident protocol.”

For instance, in March of 2018, Alabama enacted the Alabama Breach Notification Act of 2018 (2018-396), which requires business entities to have certain security measures in place and predetermined notification measures to alert impacted individuals of the breach within a reasonable amount of time. Chubb predicts that this year lawmakers will not only shift their attention to companies’ data collection and data usage practices, but also on the actions that organizations should take to better prevent a cyber incident from occurring.

  1. “Crime does pay, and business is booming: the business model of cybercrime will tilt heavily toward direct monetization attacks.”

According to Chubb, this means that cyber criminals will prioritize attacks that result in direct monetization, and in order to pursue these types of attacks, criminals will continue to employ ransomware. Consequently, ransomware will continue to grow and become more destructive.

  1. “Cyber criminals will target individuals just as much as businesses as billions of Internet of Things (IoT) devices come online.”

IoT devices, such as vehicles, smart phones, nanny-cams and home appliances, will provide cyber criminals with more ways to target individuals and opportunities to gather personal information.

All in all, business leaders should strive to defend their companies from cyberattacks through preparedness rather than respond to cyber attacks. Cyber insurance plays a key role in protecting your company and managing cybersecurity risks. If you’re interested in obtaining cyber insurance, contact a consultant at The Prewitt Group today!

iStock 848867250

In case you haven’t heard, Alabama’s new data breach notification law went into effect on June 1st. In short, the law requires a business entity that “acquires or uses sensitive personally identifiable information (Sensitive PII)” to have certain security measures in place and predetermined notification measures to alert impacted individuals of the breach within a reasonable amount of time.

Read more

iStock 695593246

Data breaches are on the rise and a concern for businesses of all industries. For instance, since January 2017, at least 14 retailers have been hacked and likely had information stolen from them. The healthcare industry has also been a target for cyber-criminals, along with the City of Atlanta and many more.

Read more

cyberattacks

Recently, the City of Atlanta was crippled by a ransomware attack that The New York Times called “one of the most sustained and consequential cyberattacks ever mounted against a major American city.” The city’s computer systems were held hostage after being hacked by a third party who locked them out and demanded money in exchange for re-access to the systems.

Read more