Ein Wlan-Router (Symbolbild).
Dienstag, 29.11.2016 17:05 von | Aufrufe: 141

New Forms of Cyber-Attacks - Steps Businesses Must Take to Prepare For, and Mitigate Risks From, Growing Security Threats

Ein Wlan-Router (Symbolbild). pexels.com

PR Newswire

ITASCA, Ill., Nov. 29, 2016 /PRNewswire/ -- A growing array of security and privacy threats, individually or in combination, pose significant financial, reputational and physical harm to businesses, organizations and the communities they serve. It is critical for organizations of all sizes to understand these various exposures and learn how to detect and address them.

Arthur J. Gallagher & Co. Logo

Protecting Security and Privacy in an Interconnected World, a new report available from Arthur J. Gallagher & Co., examines common and emerging technological vulnerabilities and the steps that organizations can take to prepare for, mitigate and address them. Download the report at www.ajg.com/cyberthreats.

Cyber liability insurance and risk specialist Adam Cottini notes that cyber-attacks can be financially, competitively, politically or ideologically motivated. They can even be the work of thrill-seekers with no specific agenda. These attacks can come from outside or within the organization. Regardless of their origins or the motivations behind them, cyber-attacks can have serious, potentially devastating consequences.

Cottini, Managing Director of Arthur J. Gallagher & Co.'s Cyber Liability Practice, spotlights the growing threat from connected technology. "Security may not always be the manufacturer's top priority because considerations such as speed to market and returns on investment tend to overshadow the investment in security," he says. "The more networked technology we use, the more ways there are for hackers to infiltrate databases and cause financial or physical harm. Thus there is a growing need for organizations and individuals to be vigilant in protecting connected systems from the consequences of these threats."

Steps that organizations can take immediately to ensure that they are better prepared when a breach occurs include:

  • Bringing together representatives from all functional areas with responsibilities for managing cyber risk to identify and set high-level security priorities, understanding that reducing this risk involves more than an organization's information technology team
  • Cultivating an internal culture of security awareness, educating and training employees to report suspicious activity or potential/actual breaches
  • Developing an Incident Response Plan detailing the organization's process for addressing a potential or known breach
  • Interviewing multiple qualified breach response attorneys in advance of a breach, and selecting more than one, in the event that a conflict arises

The report examines the insurance coverages that can come into play in the event of a cyber breach, including the third-party liability and first-party breach response and operational costs that are eligible for coverage under a traditional cyber insurance policy. Some cyber exposures, including many related to the Internet of Things, are not covered by a traditional cyber policy but may be covered under other property/casualty insurance policies. Cottini also details the critical steps that organizations should take immediately after a breach has been detected to ensure that insurance applies.

Given the number of coverage variables, Cottini finally recommends that organizations seek the advice of an insurance broker with expertise in cyber insurance to avoid encountering any unanticipated coverage gaps if a breach occurs.


ARIVA.DE Börsen-Geflüster

Kurse

221,30
0,00%
Gallagher Realtime-Chart

Arthur J. Gallagher & Co. (NYSE: AJG), an international insurance brokerage and risk management services firm, has operations in 33 countries and offers client service capabilities in more than 150 countries around the world through a network of correspondent brokers and consultants. For more information, visit www.ajg.com.

Media Contacts:




Anna Rozenich

Linda J. Collins

630-285-5954

630-285-4009

Anna_Rozenich@ajg.com 

Linda_Collins@ajg.com

Logo - http://photos.prnewswire.com/prnh/20160316/345244LOGO

 

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/new-forms-of-cyber-attacks--steps-businesses-must-take-to-prepare-for-and-mitigate-risks-from-growing-security-threats-300369775.html

SOURCE Arthur J. Gallagher & Co.

Werbung

Mehr Nachrichten zur Gallagher Aktie kostenlos abonnieren

E-Mail-Adresse
Benachrichtigungen von ARIVA.DE
(Mit der Bestellung akzeptierst du die Datenschutzhinweise)

Hinweis: ARIVA.DE veröffentlicht in dieser Rubrik Analysen, Kolumnen und Nachrichten aus verschiedenen Quellen. Die ARIVA.DE AG ist nicht verantwortlich für Inhalte, die erkennbar von Dritten in den „News“-Bereich dieser Webseite eingestellt worden sind, und macht sich diese nicht zu Eigen. Diese Inhalte sind insbesondere durch eine entsprechende „von“-Kennzeichnung unterhalb der Artikelüberschrift und/oder durch den Link „Um den vollständigen Artikel zu lesen, klicken Sie bitte hier.“ erkennbar; verantwortlich für diese Inhalte ist allein der genannte Dritte.


Andere Nutzer interessierten sich auch für folgende News