What is more impactful today than disrupting the global supply chain? With a growing dependence on technology, the logistics industry has a target on its back for cybercrime.
Risks of Ransomware
Suppose you log onto your computer to discover your data is being held hostage until you pay a $1M ransom to a cybercriminal. How would you respond? What would the impact be if this led to a total systems outage lasting two weeks? Are you aware that by paying the ransom, you may unknowingly engage with a terrorist organization which could result in regulatory fines? Ransomware attacks are the leading cause of cyber loss today. It can take weeks to recover your systems, months to understand the severity of the breach, and hundreds of thousands or even millions of dollars to correct the damage.
Social Engineering Fraud – not the party you want to be invited to
Another prevalent cybercrime is Social Engineering Fraud, which is a tactic of manipulating, influencing, or deceiving a victim to access private information, gain control over a computer system, or steal financial information. The criminal often impersonates a vendor or a co-worker, and the scam can happen to the unsuspecting victim online, via text, or by phone. Social engineering scams typically target victims to corrupt data & cause harm or to trick them into sending money. Social engineering schemes are often how criminals gain access to the victim's computer system, which may ultimately lead to a ransomware attack.
There are several types of Social Engineering attacks to be aware of:
An organization's biggest mistake is assuming it will not be a target. However, phishing attacks have increased consistently in the last year. According to The State of Phishing report by SlashNext, malicious URLs from 2021 to 2022 increased by 61%, equating to 255 million phishing attacks detected in 2022. There has also been a 50% increase in mobile phishing threats. You need a multi-faceted plan to combat cybercrimes like ransomware and social engineering. You also need a comprehensive insurance policy. Cybercrimes should be addressed as a Business Risk, not just an IT issue. Your priority should be analyzing your operations and identifying your dependence on IT. How would you reach employees or clients if your system was compromised?
Mitigation Strategies
Below is a list of some risk mitigation strategies that you may want to consider:
Cyber insurance is the most dynamic and innovative type of insurance today. A Cyber policy will consist of 1st Party Coverage for your financial losses due to cyber extortion, funds transfer fraud, and lost revenue. It will also include 3rd Party coverages (including litigation expenses, settlements, and regulatory fines), which respond to damages suffered by third parties because of a cyberattack on your system. A comprehensive cyber insurance program should include pre-breach services, including ongoing vulnerability scans, and post-breach services, including access to cybersecurity experts to coordinate a response plan.
Considering these issues, can your organization afford not to be prepared? Don't hesitate to contact me if you want to discuss your Cyber insurance coverage.