SlideShare a Scribd company logo
1 of 2
Download to read offline
Cyber Criminals Can Exploit Any Organisation’s
Weaknesses, No Matter the Size
In 2016 alone, businesses of all sizes received an
average of 230,000 cyber attacks. Learn about the
weaknesses in their cyber defences in order to bolster
your own.
Most Pay Ransomware Despite Claiming They
Never Would
Within the last two years, nearly half of all UK
businesses have been infected with ransomware, a
malicious and dangerous piece of software that could
bring your business to a grinding halt.
Recent Cyber Security News
and Prosecutions
Read about how the British Heart Foundation and the
Royal Society for the Prevention of Cruelty to Animals
were fined by the ICO for secretly screening millions
of their donors, how fines under the General Data
Protection Regulation (GDPR) could cost the UK
economy £122 billion, and about three former
Enterprise Rent-A-Car employees that used their
positions for personal gain before being caught by
the ICO.
Cyber Criminals Can Exploit Any Organisation’s
Weaknesses, No Matter the Size
On average, each UK business was subject to 230,000 cyber attacks in
2016, according to research provided by internet service provider, Beaming.
Very few of these attacks were successful, but the sheer volume is
noteworthy. In November, for the first time ever, more than 1,000 attacks
per day hit individual company firewalls, contributing to an overall cost to the
UK economy of £34.1 billion. What’s more, is that 2 out of 3 large
businesses and SMEs were hit with cyber attacks in 2016, according to
research from the government and the Federation of Small Businesses.
Even though businesses of all sizes are being targeted by cyber criminals,
the methods that they use to get past the various cyber defences can be
drastically different.
Below are some common trends among both large businesses and SMEs
that your organisation can review in order to better prepare itself.
Large Businesses’ Cyber Weaknesses
 Overconfidence. According to a report published by multinational
professional services firm, EY, 50 per cent of the organisations
surveyed stated that their cyber defences would be able to detect a
sophisticated cyber attack. However, 86 per cent of the surveyed
organisations also stated that their cyber security does not adequately
meet their organisation’s needs.
 Lack of a formal cyber security breach programme. Sixty-four per
cent of organisations do not have a cyber security breach programme in
place. This includes cyber security training for all employees in order to
help them identify, handle and report cyber threats. What’s more, 55 per
cent of organisations are unable to identify vulnerabilities in their cyber
security.
SMEs’ Cyber Weaknesses
 Lack of cyber defences. Despite the potential risks that cyber attacks
pose, 45 per cent of SMEs still do not have a cyber breach response
plan. Even worse, only 7 per cent of SMEs have cyber insurance,
according to industry research.
 Doubt. According to market research specialists, Juniper Research, 27
per cent of SMEs believe that they are too small to be of any interest to
cyber attackers. This perception of invulnerability can be rather costly,
as the average cost of a cyber breach is between £75,000 and
£310,000. Furthermore, this does not include costs due to a loss of
reputation or business disruptions.
January/February 2017
Contains public sector information published by the ICO and licensed under the Open
Government Licence v3.0.
Design © 2017 Zywave, Inc. All rights reserved. This publication is for informational
purposes only. It is not intended to be exhaustive nor should any discussion or
opinions be construed as compliance or legal advice. In relation to any particular
problem which they may have, readers are advised to seek specific advice. Further,
the law may have changed since first publication and the reader is cautioned
accordingly.
Recent Cyber Security
News and Prosecutions
British Heart Foundation and Royal
Society for the Prevention of Cruelty to
Animals Fined
Both the British Heart Foundation (BHF) and the
Royal Society for the Prevention of Cruelty to
Animals (RSPCA) were fined for secretly
screening millions of their donors. The intent of the
organisations was to identify wealthier donors and
target them specifically in order to receive more
donations. Upon completing its investigations, the
Information Commissioner’s Office (ICO) issued a
substantial fine to each organisation (£18,000 to
BHF and £25,000 to RSPCA) and instructed them
to cease their data-matching activities to obtain
data that donors had not freely provided.
Fines Under GDPR Could Cost British
Businesses £122 Billion
According to new findings from the Payment Card
Industry Security Standards Council, UK
businesses could experience up to £122 billion in
fines for cyber security breaches in 2018. The
estimate is based upon the new EU legislation that
will set regulatory penalties for cyber security
breaches at 4 per cent of global turnover. In
addition, the council has stated that the cap for the
penalty will be set at £18 million. Whilst the United
Kingdom may have already left the EU by 2019,
Prime Minister Theresa May has stated that she
intends to sign all current European law into UK
law and repeal it gradually. That means that the
forthcoming cyber security legislation would still
apply to UK businesses even after Brexit.
Individuals Fined for Violating Data
Protection Act
Three former employees of Enterprise Rent-A-Car
—Andrew Minty, Jamie Leong and Michelle
Craddock—pled guilty to conspiracy to steal
customer information. At different times, each of
the former employees obtained personal data from
the company’s systems and passed it along to
claims management companies in order to pursue
personal injury claims. Minty was fined £7,500.
Leong was sentenced to a conditional discharge
for 12 months, with prosecution costs of £3,000 to
be paid within two years. Craddock was also
sentenced to a conditional discharge for 12
months, with prosecution costs of £1,200 to be
paid within two years.
PIB Insurance Brokers
St Brandon's House
Bristol, BS1 5QT
01179269937
http://www.pib-insurance.com/
Most Pay Ransomware Despite Claiming
They Never Would
Within the last 24 months, 44 per cent of all UK organisations have been
infected by ransomware, and 27 per cent of those were infected more than
once, according to recent research published by cyber security firm, Trend
Micro. Ransomware is a type of malicious software (malware) designed to
block access to specific data, files or even the entire computer until a
designated sum is paid to the cyber criminals responsible for the attack. Of
the organisations that have been infected with this type of malware, 1 in 3
stated that their employees were affected by the attack along with an
estimated 31 per cent of their customers. This type of cyber attack can be
especially dangerous if an organisation does not have any sort of digital
backup for the data and files that could be sequestered by malware.
Despite the potential damage that this type of cyber attack could cause,
nearly 75 per cent of surveyed organisations who have not been infected by
ransomware stated that they would never pay cyber criminals. Yet, 65 per
cent of organisations that have been infected end up paying the ransom.
The average cost for an organisation is £540, but 1 in 5 businesses have
paid more than £1,000. Unfortunately, less than half of those organisations
actually get their blocked data back.
The effects of a cyber attack are not just financial, as an organisation
infected with malware may also be affected by a loss of reputation and
business interruptions. In fact, it takes an average of 33 hours to repair the
damage caused by ransomware. To ensure that your organisation is
protected from ransomware, follow these simple best practices:
 Provide all employees—from the directors and officers to the interns—
with comprehensive data security training to ensure that they know
how to identify and manage cyber security threats, such as suspicious
email requests or webpage prompts.
 Purchase cyber insurance and install security software on each
computer in your organisation to detect and stop malware and viruses.
In addition, you may want to consider drafting a non-work mobile
device policy to minimise the potential of a data breach caused by an
employee’s personal device.

More Related Content

What's hot

Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics Chris Stallard
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UKGary Chambers
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Adriana Sanford
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawNexus Publishing
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industrySOCRadar Inc
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
HIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity AlertsHIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity AlertsJessica Parker
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryFerrariT1
 
Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Gary Chambers
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Gary Chambers
 

What's hot (18)

Cyber Insurance - The Basics
Cyber Insurance - The Basics Cyber Insurance - The Basics
Cyber Insurance - The Basics
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014Data Security and Privacy Under The Compliance Spotlight April 2014
Data Security and Privacy Under The Compliance Spotlight April 2014
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Your Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the LawYour Best Practice Guide to Social Media and the Law
Your Best Practice Guide to Social Media and the Law
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
HIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity AlertsHIPAA and Cybersecurity Alerts
HIPAA and Cybersecurity Alerts
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
Cyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care IndustryCyber & Privacy Liability for Health Care Industry
Cyber & Privacy Liability for Health Care Industry
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018
 

Similar to Cyber risks and liabilities newsletter jan feb 2017

CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalMorgan Jones
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Gary Chambers
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfFiyona Nourin
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Michael C. Keeling, Esq.
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINALChris Evans
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaperSyzygal
 
Cybertorts
CybertortsCybertorts
Cybertortspanabaha
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Brian Levine
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?David Hunt
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 

Similar to Cyber risks and liabilities newsletter jan feb 2017 (20)

CIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survivalCIR Magazine - Cyber Readiness, key to survival
CIR Magazine - Cyber Readiness, key to survival
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Cybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdfCybersecurity in Pandemic time.pdf
Cybersecurity in Pandemic time.pdf
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Bridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JBBridge Cyber Crime_March_JB
Bridge Cyber Crime_March_JB
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!Cyber - it's all now a matter of time!
Cyber - it's all now a matter of time!
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Cyber liability FINAL
Cyber liability FINALCyber liability FINAL
Cyber liability FINAL
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Iso 27001 whitepaper
Iso 27001 whitepaperIso 27001 whitepaper
Iso 27001 whitepaper
 
Cyber
Cyber Cyber
Cyber
 
Cybertorts
CybertortsCybertorts
Cybertorts
 
Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015Information Security and Data Breach Trends 2014-2015
Information Security and Data Breach Trends 2014-2015
 
How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?How Vulnerable Is Your Industry to Cyber Crime?
How Vulnerable Is Your Industry to Cyber Crime?
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 

More from Kieren Windsor

IPT increases 1st June
IPT increases 1st JuneIPT increases 1st June
IPT increases 1st JuneKieren Windsor
 
News brief fca's new personal lines disclosure rules
News brief   fca's new personal lines disclosure rulesNews brief   fca's new personal lines disclosure rules
News brief fca's new personal lines disclosure rulesKieren Windsor
 
Hse safety cornerstones april 2017
Hse safety cornerstones april 2017Hse safety cornerstones april 2017
Hse safety cornerstones april 2017Kieren Windsor
 
News brief spring budget 2017 highlights
News brief   spring budget 2017 highlightsNews brief   spring budget 2017 highlights
News brief spring budget 2017 highlightsKieren Windsor
 
HSE Safety Cornerstones
HSE Safety CornerstonesHSE Safety Cornerstones
HSE Safety CornerstonesKieren Windsor
 
HR first quarter briefing
HR first quarter briefingHR first quarter briefing
HR first quarter briefingKieren Windsor
 

More from Kieren Windsor (6)

IPT increases 1st June
IPT increases 1st JuneIPT increases 1st June
IPT increases 1st June
 
News brief fca's new personal lines disclosure rules
News brief   fca's new personal lines disclosure rulesNews brief   fca's new personal lines disclosure rules
News brief fca's new personal lines disclosure rules
 
Hse safety cornerstones april 2017
Hse safety cornerstones april 2017Hse safety cornerstones april 2017
Hse safety cornerstones april 2017
 
News brief spring budget 2017 highlights
News brief   spring budget 2017 highlightsNews brief   spring budget 2017 highlights
News brief spring budget 2017 highlights
 
HSE Safety Cornerstones
HSE Safety CornerstonesHSE Safety Cornerstones
HSE Safety Cornerstones
 
HR first quarter briefing
HR first quarter briefingHR first quarter briefing
HR first quarter briefing
 

Recently uploaded

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 

Recently uploaded (20)

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 

Cyber risks and liabilities newsletter jan feb 2017

  • 1. Cyber Criminals Can Exploit Any Organisation’s Weaknesses, No Matter the Size In 2016 alone, businesses of all sizes received an average of 230,000 cyber attacks. Learn about the weaknesses in their cyber defences in order to bolster your own. Most Pay Ransomware Despite Claiming They Never Would Within the last two years, nearly half of all UK businesses have been infected with ransomware, a malicious and dangerous piece of software that could bring your business to a grinding halt. Recent Cyber Security News and Prosecutions Read about how the British Heart Foundation and the Royal Society for the Prevention of Cruelty to Animals were fined by the ICO for secretly screening millions of their donors, how fines under the General Data Protection Regulation (GDPR) could cost the UK economy £122 billion, and about three former Enterprise Rent-A-Car employees that used their positions for personal gain before being caught by the ICO. Cyber Criminals Can Exploit Any Organisation’s Weaknesses, No Matter the Size On average, each UK business was subject to 230,000 cyber attacks in 2016, according to research provided by internet service provider, Beaming. Very few of these attacks were successful, but the sheer volume is noteworthy. In November, for the first time ever, more than 1,000 attacks per day hit individual company firewalls, contributing to an overall cost to the UK economy of £34.1 billion. What’s more, is that 2 out of 3 large businesses and SMEs were hit with cyber attacks in 2016, according to research from the government and the Federation of Small Businesses. Even though businesses of all sizes are being targeted by cyber criminals, the methods that they use to get past the various cyber defences can be drastically different. Below are some common trends among both large businesses and SMEs that your organisation can review in order to better prepare itself. Large Businesses’ Cyber Weaknesses  Overconfidence. According to a report published by multinational professional services firm, EY, 50 per cent of the organisations surveyed stated that their cyber defences would be able to detect a sophisticated cyber attack. However, 86 per cent of the surveyed organisations also stated that their cyber security does not adequately meet their organisation’s needs.  Lack of a formal cyber security breach programme. Sixty-four per cent of organisations do not have a cyber security breach programme in place. This includes cyber security training for all employees in order to help them identify, handle and report cyber threats. What’s more, 55 per cent of organisations are unable to identify vulnerabilities in their cyber security. SMEs’ Cyber Weaknesses  Lack of cyber defences. Despite the potential risks that cyber attacks pose, 45 per cent of SMEs still do not have a cyber breach response plan. Even worse, only 7 per cent of SMEs have cyber insurance, according to industry research.  Doubt. According to market research specialists, Juniper Research, 27 per cent of SMEs believe that they are too small to be of any interest to cyber attackers. This perception of invulnerability can be rather costly, as the average cost of a cyber breach is between £75,000 and £310,000. Furthermore, this does not include costs due to a loss of reputation or business disruptions. January/February 2017
  • 2. Contains public sector information published by the ICO and licensed under the Open Government Licence v3.0. Design © 2017 Zywave, Inc. All rights reserved. This publication is for informational purposes only. It is not intended to be exhaustive nor should any discussion or opinions be construed as compliance or legal advice. In relation to any particular problem which they may have, readers are advised to seek specific advice. Further, the law may have changed since first publication and the reader is cautioned accordingly. Recent Cyber Security News and Prosecutions British Heart Foundation and Royal Society for the Prevention of Cruelty to Animals Fined Both the British Heart Foundation (BHF) and the Royal Society for the Prevention of Cruelty to Animals (RSPCA) were fined for secretly screening millions of their donors. The intent of the organisations was to identify wealthier donors and target them specifically in order to receive more donations. Upon completing its investigations, the Information Commissioner’s Office (ICO) issued a substantial fine to each organisation (£18,000 to BHF and £25,000 to RSPCA) and instructed them to cease their data-matching activities to obtain data that donors had not freely provided. Fines Under GDPR Could Cost British Businesses £122 Billion According to new findings from the Payment Card Industry Security Standards Council, UK businesses could experience up to £122 billion in fines for cyber security breaches in 2018. The estimate is based upon the new EU legislation that will set regulatory penalties for cyber security breaches at 4 per cent of global turnover. In addition, the council has stated that the cap for the penalty will be set at £18 million. Whilst the United Kingdom may have already left the EU by 2019, Prime Minister Theresa May has stated that she intends to sign all current European law into UK law and repeal it gradually. That means that the forthcoming cyber security legislation would still apply to UK businesses even after Brexit. Individuals Fined for Violating Data Protection Act Three former employees of Enterprise Rent-A-Car —Andrew Minty, Jamie Leong and Michelle Craddock—pled guilty to conspiracy to steal customer information. At different times, each of the former employees obtained personal data from the company’s systems and passed it along to claims management companies in order to pursue personal injury claims. Minty was fined £7,500. Leong was sentenced to a conditional discharge for 12 months, with prosecution costs of £3,000 to be paid within two years. Craddock was also sentenced to a conditional discharge for 12 months, with prosecution costs of £1,200 to be paid within two years. PIB Insurance Brokers St Brandon's House Bristol, BS1 5QT 01179269937 http://www.pib-insurance.com/ Most Pay Ransomware Despite Claiming They Never Would Within the last 24 months, 44 per cent of all UK organisations have been infected by ransomware, and 27 per cent of those were infected more than once, according to recent research published by cyber security firm, Trend Micro. Ransomware is a type of malicious software (malware) designed to block access to specific data, files or even the entire computer until a designated sum is paid to the cyber criminals responsible for the attack. Of the organisations that have been infected with this type of malware, 1 in 3 stated that their employees were affected by the attack along with an estimated 31 per cent of their customers. This type of cyber attack can be especially dangerous if an organisation does not have any sort of digital backup for the data and files that could be sequestered by malware. Despite the potential damage that this type of cyber attack could cause, nearly 75 per cent of surveyed organisations who have not been infected by ransomware stated that they would never pay cyber criminals. Yet, 65 per cent of organisations that have been infected end up paying the ransom. The average cost for an organisation is £540, but 1 in 5 businesses have paid more than £1,000. Unfortunately, less than half of those organisations actually get their blocked data back. The effects of a cyber attack are not just financial, as an organisation infected with malware may also be affected by a loss of reputation and business interruptions. In fact, it takes an average of 33 hours to repair the damage caused by ransomware. To ensure that your organisation is protected from ransomware, follow these simple best practices:  Provide all employees—from the directors and officers to the interns— with comprehensive data security training to ensure that they know how to identify and manage cyber security threats, such as suspicious email requests or webpage prompts.  Purchase cyber insurance and install security software on each computer in your organisation to detect and stop malware and viruses. In addition, you may want to consider drafting a non-work mobile device policy to minimise the potential of a data breach caused by an employee’s personal device.