Beware the Cyber Boogey Man


photo-avoiding-cyber-attacks-from-top-compliance-officer-david-kiddEver since the internet was created, people have discovered new and faster ways to stay connected with one another.

Social media has become the newest platform for marketing and advertising completely changing the way businesses and organizations communicate to their audience. Advanced computer softwares have provided efficient ways for small businesses, healthcare companies, and even independent insurance agencies to collect and store all their client’s information in one organized place. And families can chat with each other all across the world.

What is seemingly harmless and easier to work with actually poses some problematic situations for unfortunate victims: cyber attacks. With the advancement of technology has come the advancement of hacking strategies. Nowadays it’s no challenge for someone to hack into an account and steal all of your information.

The Beazley Breach Response (BBR) Services unit is a provider of data breach response insurance that helps and protects their customers from data hackers. According to Beazley the number of data breaches has increased significantly in healthcare, the financial services, and even higher education sectors.

Medical records have proven to be extremely valuable to hackers for identify theft, etc. In one case a hospital in California said they had to pay a ransom for their medical records. Known as “Ransomware”, hackers/criminals will actually hold the records ‘hostage’ until they get the desired amount of money. Colleges and universities have suffered the same fate from ‘spear phishing’ (phi: personal healthcare information) where hackers will send seemingly legitimate emails to the school with dangerous links or attachments in order to gain access.

We know it’s scary to think that you are at risk, but here are some precautions you can take to make sure your business and employees are protected.

  1. Train your employees on the importance of protecting their own information.
  2. Create an incident response plan and test it out to see where the vulnerabilities in your system may lie.
  3. Come up with responses that are tailored to specific data. React appropriately to the threat level of the data.
  4. Be mindful of the other companies you allow to have access to your data.
  5. Password protect EVERYTHING and encrypt data on ALL devices as you see fit.

Now you might be saying, “It would never happen to us.” But let me tell you, it happens to the best of us. It might happen to you or it might not. Just always be prepared.


April 21st, 2016 by Georgia Non-Profit Insurance