SlideShare a Scribd company logo
1 of 21
How To:
Protect Your Business
from a Cyber Attack
Common Types of Cybercrime
• Ransomware
• Phishing
• Business email compromise (BEC) scams
1. Business-grade Antivirus
Centrally managed
Flexible licensing
Support for mobile
devices
Customisable
Lightweight
Always up-to-date
2. Review Software
White-listing of
programs
Legitimate software
online
Automatically update
core software
3. Restrict Access
Unique passwords /
password manager
Limiting admin access
to specific people
Password reset
protocols
Limit ability to
use USB
Multi-factor
authentication
4. Staff Training
Recognising scam
emails
What to do
Understanding the
ways that viruses are
transferred
95% of cyber incidents
are caused by human
error!
5. Backup
Offsite to multiple
locations
At least daily
Automated to reduce
human error
Backup as much as
possible
Test regularly!
6. Cyber Insurance
How to mitigate your cyber
security risks through
insurance
PRESENTED BY HAYDEN ARMSTRONG EMAIL: HAYDEN@ARMSTRONGS.NET.AU
ARMSTRONG’S INSURANCE BROKERS PHONE: 0417568322
AFSL NO: 244408
About
Armstrong’s
Insurance
Brokers
The information contained in this presentation is general advice only. In
order to consider your individual needs a detailed needs analysis of
should be undertaken. Please consider the appropriateness of this
general advice.
Cyber
insurance
what is it and
do you need
it
The figures …
 The annual cost globally is
more than $400 billion.
 Number one economic
crime Australian companies
face.
 65% of Australian
organisations experienced
some form of cybercrime in
the past 2 years.
Examples of
data breaches
 Opportunistic or negligent
employees accessing
information and using it without
authority;
 A lost or stolen laptop, phone
or memory stick;
 Unsecured IT networks;
 System failures;
 Third party faults; and
 Hacking attacks.
Scary statistics …
© Dual Australia
Potential
liabilities and
risks of a
cyber breach
 Reputational risk
 Investigation by regulators (e.g. Office of
the Australian Information Commissioner
and Office of the Privacy Commissioner)
 Fines following breaches of privacy (up to
$1.8M for companies and individuals up
to $360,000)
 Misleading and deceptive conduct
 Breaches of continuous disclosure
obligations
 Breaches of fiduciary duty
 Breaches of the duty of confidence
 Breach of contract
 Breach of the duty of care (negligence)
 Infringement of intellectual property rights.
Traditional
insurance
policies won’t
come to the
rescue
 Commercial general liability (CGL)
policies X
 Commercial property (business
interruption) policies X
 Directors' and officers' (D&O) liability
policies X
 Errors and omissions (E&O) policies X
Examples
Do you need
cyber
insurance?
YES!
 How reliant is your business on computer
systems? What would the cost of a computer
outage be and how quickly would that cost
materialise?
 How is your data sent, stored and used? Can
the data be accessed by third parties, stolen or
lost?
 How sensitive is the data being held?
 What would the reputational cost be to your
business in the event of an information breach?
What does
cyber
insurance
cover?
 Personal and Corporate data theft
 Data Security
 Notification and monitoring costs
 Statutory fines and penalties
 Defence costs
 Data Investigations
 Reputational repair/PR following breach
 Media Content
 Cyber Extortion
 Loss of revenue following security failure
Questions?
Hayden Armstrong
Armstrong’s Insurance Brokers
hayden@armstrongs.net.au
Phone: 0417568322

More Related Content

What's hot

Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
Tony Richardson CISSP
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
07Deeps
 
Information Security
Information SecurityInformation Security
Information Security
ikonick
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
Paul Melson
 
Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.
Gilbert Verdian
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
OriginalGSM
 

What's hot (20)

IT security
IT securityIT security
IT security
 
Octree securapro mauleverer case study
Octree securapro mauleverer case studyOctree securapro mauleverer case study
Octree securapro mauleverer case study
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
Information Security
Information SecurityInformation Security
Information Security
 
Cybersecurity Toolkit
Cybersecurity ToolkitCybersecurity Toolkit
Cybersecurity Toolkit
 
Information security for business majors
Information security for business majorsInformation security for business majors
Information security for business majors
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
IT Security
IT SecurityIT Security
IT Security
 
Online Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client AccountsOnline Security Breach Compromises 77 Million Client Accounts
Online Security Breach Compromises 77 Million Client Accounts
 
Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.Security Compliance and Management - Issues Faced by Organisations Today.
Security Compliance and Management - Issues Faced by Organisations Today.
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Cybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber AttackCybersecurity: How to Protect Your Firm from a Cyber Attack
Cybersecurity: How to Protect Your Firm from a Cyber Attack
 
Cybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to KnowCybersecurity Facts & Figures - What Every Business Needs to Know
Cybersecurity Facts & Figures - What Every Business Needs to Know
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 

Similar to Protecting Your Business from a Cyber Attack

Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
Mark Bennett
 

Similar to Protecting Your Business from a Cyber Attack (20)

Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
Cyber hygiene Training slide. It focuses on what you need to know to be safe ...
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
Cyber Security Services for Business.pdf
Cyber Security Services for Business.pdfCyber Security Services for Business.pdf
Cyber Security Services for Business.pdf
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
IT & Network Security Awareness
IT & Network Security AwarenessIT & Network Security Awareness
IT & Network Security Awareness
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Protecting Your Business from a Cyber Attack

  • 1. How To: Protect Your Business from a Cyber Attack
  • 2.
  • 3. Common Types of Cybercrime • Ransomware • Phishing • Business email compromise (BEC) scams
  • 4. 1. Business-grade Antivirus Centrally managed Flexible licensing Support for mobile devices Customisable Lightweight Always up-to-date
  • 5. 2. Review Software White-listing of programs Legitimate software online Automatically update core software
  • 6. 3. Restrict Access Unique passwords / password manager Limiting admin access to specific people Password reset protocols Limit ability to use USB Multi-factor authentication
  • 7. 4. Staff Training Recognising scam emails What to do Understanding the ways that viruses are transferred 95% of cyber incidents are caused by human error!
  • 8. 5. Backup Offsite to multiple locations At least daily Automated to reduce human error Backup as much as possible Test regularly!
  • 10. How to mitigate your cyber security risks through insurance PRESENTED BY HAYDEN ARMSTRONG EMAIL: HAYDEN@ARMSTRONGS.NET.AU ARMSTRONG’S INSURANCE BROKERS PHONE: 0417568322 AFSL NO: 244408
  • 11. About Armstrong’s Insurance Brokers The information contained in this presentation is general advice only. In order to consider your individual needs a detailed needs analysis of should be undertaken. Please consider the appropriateness of this general advice.
  • 12. Cyber insurance what is it and do you need it
  • 13. The figures …  The annual cost globally is more than $400 billion.  Number one economic crime Australian companies face.  65% of Australian organisations experienced some form of cybercrime in the past 2 years.
  • 14. Examples of data breaches  Opportunistic or negligent employees accessing information and using it without authority;  A lost or stolen laptop, phone or memory stick;  Unsecured IT networks;  System failures;  Third party faults; and  Hacking attacks.
  • 15. Scary statistics … © Dual Australia
  • 16. Potential liabilities and risks of a cyber breach  Reputational risk  Investigation by regulators (e.g. Office of the Australian Information Commissioner and Office of the Privacy Commissioner)  Fines following breaches of privacy (up to $1.8M for companies and individuals up to $360,000)  Misleading and deceptive conduct  Breaches of continuous disclosure obligations  Breaches of fiduciary duty  Breaches of the duty of confidence  Breach of contract  Breach of the duty of care (negligence)  Infringement of intellectual property rights.
  • 17. Traditional insurance policies won’t come to the rescue  Commercial general liability (CGL) policies X  Commercial property (business interruption) policies X  Directors' and officers' (D&O) liability policies X  Errors and omissions (E&O) policies X
  • 19. Do you need cyber insurance? YES!  How reliant is your business on computer systems? What would the cost of a computer outage be and how quickly would that cost materialise?  How is your data sent, stored and used? Can the data be accessed by third parties, stolen or lost?  How sensitive is the data being held?  What would the reputational cost be to your business in the event of an information breach?
  • 20. What does cyber insurance cover?  Personal and Corporate data theft  Data Security  Notification and monitoring costs  Statutory fines and penalties  Defence costs  Data Investigations  Reputational repair/PR following breach  Media Content  Cyber Extortion  Loss of revenue following security failure
  • 21. Questions? Hayden Armstrong Armstrong’s Insurance Brokers hayden@armstrongs.net.au Phone: 0417568322