CAUTION
Protect your digital assets
How to prevent and recover from a cyberattack
What is a
cybersecurity
threat?
Cyber crimes target individuals and businesses. The
results of cyber-hacking can be as minor as a pesky
popup that has to be removed by your IT department, to
malware that destroys your entire organization's system.
Data is becoming one of the most important assets to
companies today. It's important to protect your company
and your client's information.
How can you prepare for a
cyberattack before it
happens?
IMPLEMENT THE PROPER CONTROLS
Connect using secure, password-protected networks
Don't click on suspcious links
Don't respond to online requests for private information
Password protect all devices that connect to the internet
Do not use the same password twice
If you see something, report it.
Inform your team of these various cyber threats
that may occur:
PROACTIVELY INFORM
AND TRAIN EMPLOYEES
Email threats
Spam threats
Phishing threats
Social Media threats
90%
of all cyber
claims come
from type of
employee
error*
What can you do
during a
cyberattack?
Take immediate action.
If a problem is found disconnect your
device from the internet and perform a full
system restore.
Report any suspicious activity right away.
Contact your manager or the IT
Department to handle the issue
immediately.
What can you do after a cyber
attack occurs?
FILE A REPORT
TO LOCAL
POLICE
Ensure there is an
official record of the
incident.
REPORT TO THE
INTERNET CRIME
COMPLIANT CENTER
Report identity theft to the
Federal Trade Commission.
CONSIDER OTHER
INFORMATION
If your personal
information was
compromised, what else
could be at risk?
How can
cyber insurance
help?
Data Breaches
Intellectual Property Rights
Damages to a Third-Party
System
System Failure
Cyber Extortion
Business Interruption
Cyber insurance can help keep
your business covered when
you need it most. Here's what
is covered under a typical
cyber insurance policy:
Your traditional business liability insurance likely doesn't cover
cybersecurity risks. With the increase in cybersecurity breaches
over the last few months, it's never been more important to
protect your company!
www.ioausa.us
WEBSITE
Roger.j.stewart@ioausa.com
EMAIL
SOCIAL MEDIA
Contact Roger today!

Caution! It's time to understand your CyberSecurity risk!

  • 1.
    CAUTION Protect your digitalassets How to prevent and recover from a cyberattack
  • 2.
    What is a cybersecurity threat? Cybercrimes target individuals and businesses. The results of cyber-hacking can be as minor as a pesky popup that has to be removed by your IT department, to malware that destroys your entire organization's system. Data is becoming one of the most important assets to companies today. It's important to protect your company and your client's information.
  • 3.
    How can youprepare for a cyberattack before it happens? IMPLEMENT THE PROPER CONTROLS Connect using secure, password-protected networks Don't click on suspcious links Don't respond to online requests for private information Password protect all devices that connect to the internet Do not use the same password twice If you see something, report it.
  • 4.
    Inform your teamof these various cyber threats that may occur: PROACTIVELY INFORM AND TRAIN EMPLOYEES Email threats Spam threats Phishing threats Social Media threats 90% of all cyber claims come from type of employee error*
  • 5.
    What can youdo during a cyberattack? Take immediate action. If a problem is found disconnect your device from the internet and perform a full system restore. Report any suspicious activity right away. Contact your manager or the IT Department to handle the issue immediately.
  • 6.
    What can youdo after a cyber attack occurs? FILE A REPORT TO LOCAL POLICE Ensure there is an official record of the incident. REPORT TO THE INTERNET CRIME COMPLIANT CENTER Report identity theft to the Federal Trade Commission. CONSIDER OTHER INFORMATION If your personal information was compromised, what else could be at risk?
  • 7.
    How can cyber insurance help? DataBreaches Intellectual Property Rights Damages to a Third-Party System System Failure Cyber Extortion Business Interruption Cyber insurance can help keep your business covered when you need it most. Here's what is covered under a typical cyber insurance policy:
  • 8.
    Your traditional businessliability insurance likely doesn't cover cybersecurity risks. With the increase in cybersecurity breaches over the last few months, it's never been more important to protect your company! www.ioausa.us WEBSITE Roger.j.stewart@ioausa.com EMAIL SOCIAL MEDIA Contact Roger today!