Search for insurance help

Cyber attacks, and their sophistication levels, are on the rise

Discover the true extent of your cybersecurity exposure, and develop the right strategy for protecting your data and your reputation.

Australia saw a staggering 997 data breaches reported in 2019, with a 17% increase in the second half of the year.

Globally, almost 30% of organisations are likely to suffer at least one breach over the next 24 months.

But to focus purely on the increased number of breaches is to misunderstand the true nature of the problem.

The real issue is the rising sophistication and efficacy of the attacks themselves.

How are data breaches occurring?
Almost one-third of the breaches in the second half of 2019 were linked to compromised login credentials, with phishing attacks blamed for more than 15% of these breaches. Malicious or criminal attacks were noted in 64% of breaches, while human error was blamed in 32% of all incidents1. This means that workable security policies and protocols, which adhere to your industry’s regulatory and compliance guidelines, need to be used to guide everyday behaviour. This also requires the active participation and education of your employees.

Where are cyber security threats coming from?
Cyber security threats now have many different entry points – via compromised cloud applications, social media applications, outdated devices, file sharing applications, SMS, personal email, our mobile and wearable devices, and our wireless activities generally. The scope for potential attack has become ubiquitous.

The risk doesn’t stop there.
A recent blog from the East Coast Polytechnic Institute explains: “The cyber attackers are now employing smarter ways like MIM (Man in the iMiddle) attacks to eavesdrop on data, Spying Software and Google Glass to keep track of fingerprint movements on touch screens, memory-scraping malware on POS systems along with bespoke attacks to steal specific data.”
Essentially, a business-led approach is required, which applies the right security policy and protocol to each layer of software and hardware used throughout your business.

Organisations must stay ahead or risk falling victim.
As early as 2018, Business Insider was reporting that while artificial intelligence (AI) was powering the most innovative user experience systems including digital assistants like Siri and Alexa, it was also transforming the capabilities of attackers to mimic human behaviour and communicate in a believable way.

Malicious software that can replicate a user’s writing style in a phishing attack, is very difficult to identify and defend against. Similarly, if an attacker uses AI to create self-healing code, the software could detect defences against it and actively respond to them, neutralising their efficacy. The smarter the malicious software becomes, the more difficult it is to shut down. 

We partner with you to understand your unique business challenges and drivers. Only then do we tailor an advisory strategy to meet your specific needs.

Is your current MSP putting a handbreak on your brilliance? Tecala's portfolio of managed services liberates and empowers your team to focus on transforming your business.

Flexibility, security and agility are the key features of our cloud services and migration strategies. Pay as you grow with an optimal mix of private and public cloud solutions.

Malicious software that can replicate a user’s writing style in a phishing attack, is very difficult to identify and defend against. Similarly, if an attacker uses AI to create self-healing code, the software could detect defences against it and actively respond to them, neutralising their efficacy. The smarter the malicious software becomes, the more difficult it is to shut down. 

Managed Detection and Response (MDR) is becoming critically important because it ensures a speedy and targeted response to not only cyber attacks once they’ve occurred, but also preventative actions on the alert of suspicious activities being detected.

Even with the alarming regularity and sophistication of cyber attacks, many mid-size businesses still don’t have an adequate or active cybersecurity strategy in place. Many have no strategy at all.

Having the appropriate level of Cyber Security Insurance is important, but what’s truly essential is having an end-to-end strategy that manages, monitors and protects the flow of data.

About Tecala
We’re the driving force behind your cyber security strategy.
Our specialists have provided a practical checklist to help you to review your existing security procedures and systems to strengthen the links of your defence.

We work with businesses to ensure their business-critical data is safe, secure and compliant for their industry, so they don’t become a statistic. You can find more on how we help at Security Services.

As a first step, we strongly recommend engaging with a security specialist to run a security review of your business so you can understand your risk exposure.

Assess your risk profile and take charge.
Download the 6-Point Security Checklist and review the six core aspects of cyber security that can significantly reduce your exposure to risk.

Source: CSO Australia: More breaches than ever occurring at Australian companies. March 2020
General Advice Warning: This advice is general and does not take into account your objectives, financial situation or needs. You should consider whether the advice is appropriate for you and your personal circumstances. Before you make any decision about whether to acquire a certain product, you should obtain and read the relevant product disclosure statement.

All information above has been provided by the author.


Tecala

Related articles

Comments (0)

Related insurance brokers

Review rating
16 reviews

Featured Featured

Shane Brady

Stone Lane Broking & Risk Advisory

  • Typically replies within
    a few minutes
  • Review rating
    27 reviews

    Featured Featured

    Abbie Wilson

    National Insurance Brokers

  • Typically replies within
    a few hours