Cyber Risk – you should be worried too

Cyber risk has shot up to become the 2nd largest concern for U.S. businesses in 2015 (up from 5th in 2014). Malicious attacks such as computer viruses, banking or financial system hacks, and data breaches can cripple a business’ reputation and financial standing. If your company is not prepared, it may never recover from a serious cyber risk event.

As businesses adopt cloud based and hosted solutions, implement BYOD mobile device policies, and store more and more data electronically, it becomes increasingly difficult to track and secure electronic intellectual property (“IP”) and personally identifiable information (“PII”).

The “2015 Travelers Business Risk Index” report shows that 58% of U.S. businesses consider cyber risk/data breaches something to worry about, with 29% feeling they are not equipped to deal with an event. It appears the “Year of the Breach (2014)” was eye opening and caused more and more businesses to attempt or escalate attempts to protect data and personal information.

Below are a couple of ways companies can mitigate their cyber related risk:

  1. Know where your data is stored and who has access to it – This can be a monumental task depending on the size of your company and how well data is currently managed. Seek help from a specialist if the task seems insurmountable.
  2. Have a Cyber Liability insurance policy in place to protect your company in the event of a cyber/data breach – These policies not only reimburse the company for business interruption and extra expense, they also cover crisis management expenses and regulatory defense and penalties.
  3. Develop a cyber/data breach response plan.
  4. Segregate servers and data storage locations and limit access on a strictly need-to-know basis.
  5. Encrypt personal and confidential information stored on servers and in databases.
  6. Encrypt portable devices including laptops, mobile devices, external hard drives, and backup devices.
  7. Maintain hardware and software with latest security updates and keep anti-virus measures/definitions updated.
  8. Educate employees to identify phishing, email, and other scams used to steal information.

Once a company implements the measures noted above, a monitoring and testing regiment should be put in place to ensure policies and systems do not degrade over time.  We recommend engaging specialists appropriately to ensure these tactics are adopted and deployed strategically and correctly.

About the Author

Jon Edwards is the IT Manager for The ALS Group. Click here to request more information about The ALS Group or developing a mobile security policy.

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Form Submission Response

Dear [field id="name"],

Thank you for subscribing to The ALS Group articles! We are so excited to have you on board and look forward to providing you with valuable insights, risk management advice, and industry news.

As a subscriber, you will be the first to receive our latest blog posts straight to your inbox. In addition to the blog content, we have a wealth of resources on our website that we believe will be useful to you.

If you have any questions or require any risk management advice, please contact Albert Sica, Managing Principal, at [email protected] or at 732-395-4251.

Thank you,

The ALS Group

Skip to content