Cyber-risk and liabilities update
Mitigating ransomware attacks on your business
Ransomware is malicious software designed to prevent victims from accessing their computers. Typically, a ransomware infection locks computers entirely or encrypts data, and hackers demand payment to restore access. Ransomware attacks are growing in both frequency and severity. In fact, 1 in 54 organisations in Europe fell victim to a ransomware attack during the second quarter of 2023, according to research by software company Check Point. This represents a significant 21% year-on-year increase.
With ransomware becoming increasingly prevalent, your organisation must take rigorous steps to bolster its resilience. It may be wise to work on the assumption that some malicious software will infiltrate your defences and take steps to limit its impact. Consider the following risk mitigation strategies:
- Keep up-to-date backups. Back up all important files and regularly test your backup plans to ensure potential problems are spotted before they result in data loss. Additionally, create offline backups and keep these in an off-site location or a cloud service designed for this purpose. Always scan backups for malware before restoring files in case hackers have infiltrated your network and infected them.
- Limit exposure. Leverage strategies to reduce the likelihood of malicious content reaching your devices. Specifically, use email filtering to scan messages for red flags and utilise intercepting proxies—applications that sit between a web browser and web server—to analyse traffic or block access to internet services.
- Protect devices. Centrally manage organisational devices to ensure only permitted applications are used and consider configuring a host-based firewall that’s directly installed on devices rather than networks. Additionally, install security updates as soon as they become available and use the latest operating system for devices.
- Prepare for breaches. Develop a robust cyber-incident response plan. Specifically, identify your critical assets and determine how these could be impacted by ransomware attacks. Detail how you plan to restore operations and respond to ransom demands. Remember, always keep a hard copy of your plan on a system unconnected to your main IT network for safe access in the event of breaches.
A cyber insurance policy is an emergency response hotline providing immediate access to specialist IT consultants and advisors in an emergency, as well as paying for forensic costs, public relations costs, and any regulatory defence and penalty costs as a result of a cyber extortion or data breach.
Cyber-hygiene Best Practices
Cyber-hygiene refers to habitual practices that ensure critical data and digital systems are handled safely and protected from cyber-attacks. Cyber-hygiene is increasingly vital for organisations of all types and sizes, not least because 32% of businesses and 24% of charities experienced a cyber-security breach or attack in the past 12 months, according to government data. Organisations that fail to leverage cyber-hygiene best practices could leave critical systems vulnerable, potentially resulting in financial losses, regulatory penalties, and reputational damage. To protect your organisation, consider best practices for the following cyber-hygiene factors:
- Passwords — The use of strong passwords—containing at least 12 characters and a mix of upper- and lowercase letters plus symbols and numbers—that are changed regularly is an essential cyber-hygiene practice. Ensure users don’t share passwords or repeatedly use them across different accounts.
- Multifactor authentication — Limit cyber-criminals’ opportunity to steal data by making sure important accounts, including email, social media and banking apps, require multifactor authentication.
- Data backups — Back up essential files in a separate location, such as on an external hard drive or in the cloud.
- Firewalls — Utilise a network firewall to prevent unauthorised users from accessing company websites, emails and other sources of information accessed through the internet.
- Security software — Employ high-quality antivirus software to perform automatic device scans to detect and remove malicious software and provide protection from various online threats and security breaches.
- Employee education — Employees are one of your organisation’s most significant cyber-security vulnerabilities. Arrange cyber-security training to teach employees to identify phishing attacks, social engineering and other cyber-threats.
Overall, daily routines, good behaviours and occasional check-ups can make all the difference in ensuring your organisation’s cyber health is in optimal condition.
If you have any concerns about your possible vulnerability to a cyber-attack, please contact us to discuss how cyber insurance can offer peace of mind and support. email@example.com
Information provided by Zywave and contributed by Lisa Langley Cert CII, Team Leader, Professional Risks, Cox Mahon Ltd.