Cyber Risks: Doxxing Explained

Companies of all sizes are at risk for cyber attacks – doxxing is no exception. Read this article to learn more about doxxing and how to protect your employee’s sensitive information from being exposed.

Cyber Liability - Doxxing Explained 020420

If you have any questions regarding cyber liability or want to check your liability coverage feel free to contact us. We will be happy to recommend an insurance solution that is designed to properly protect your business.

Call us at 1-877-450-1872 or contact us here, and experience the Conrey Difference for yourself.

Cyber Security 1Q Newsletter

In an era of constantly evolving cyber threats and advancing technology, no organization is immune to the risk of a cyber attack. According to recent survey data, 53% of businesses in the United States reported being the victim of a cyber attack in 2019. Read our newsletter to learn more about what  you can do to protect your business in 2020.

Cyber Risks and Liabilities - Q1 2020 020420

Here at Conrey Insurance Brokers, we stay ahead of the curve in order to help you mitigate the risks that pose a threat to your business; that’s The Conrey Difference. To review your business liability insurance, to check your liability coverage, or if you are interested in purchasing additional coverage, feel free to contact us. We will be happy to recommend an insurance solution that is designed to properly protect your business.

Call us at 1-877-450-1872 or contact us here, and experience the Conrey Difference for yourself.

The Importance of Cyber Insurance

When cyber attacks like data breaches and hacks occur, they can have devastating results. Organizations have to deal with countless headaches, like business disruptions, lost revenue and litigation. Cyber liability insurance is now an essential component of any business’s risk management program as it provides a number of unique benefits. Watch this video to learn more.

At Conrey Insurance we want to ensure that you are covered in any instance, including if you have cyber attack. To speak with a member of the Conrey Team, call (877) 450-1872 or contact us and experience The Conrey Difference for yourself.

Cyber Criminals: Who They Are and What Motivates Them

Whether you process payments or store sensitive customer data, chances are cyber criminals have already placed a target on your organization. And while we often think cyber criminals are bunkered up in some basement, the truth is that attackers are much more sophisticated. This video examines the most common threats to a business, detailing the types of cyber criminals and what they’re after.

At Conrey Insurance we want to ensure that you know the dangers of cyber criminals. To speak with a member of the Conrey Team, call (877) 450-1872 or contact us and experience The Conrey Difference for yourself.

Protecting Your Business From a Data Breach

Even the most secure organizations are at risk of a data breach. It can often take days or even months for a company to discover its data has been compromised. And, when it comes to preventing or responding to a data breach, having a plan and security measures in place is crucial. This video examines some key data security strategies to ensure your organization is doing all it can to protect itself from cyber criminals.

At Conrey Insurance we want to ensure that you know the risks of a data breach. To speak with a member of the Conrey Team, call (877) 450-1872 or contact us and experience The Conrey Difference for yourself.

Cyber Liability: What’s at Risk & What It’ll Cost You

When most people think about Cyber Attacks they think of the loss in data that is associated with those attacks. Unfortunately most people do not think about the monetary loss that can be associated with a breach and what it can take to recover from these attacks. According to industry experts, the average cost of a data breach is nearly $6 million. And while many organizations understand the importance of preparing for a breach, few understand what it could cost to recover from an attack and what cyber criminals might be after. This Video will show you some of the costs associated with a Cyber Attack.

At Conrey Insurance we want to ensure that you know the costs associated with a Cyber Attack. To speak with a member of the Conrey Team, call (877) 450-1872 or contact us and experience The Conrey Difference for yourself.

The Risks of Cloud Computing

To help reduce the necessity of bulky hardware and costly software many Businesses are switching to cloud based computing to store their data. As with any other technological advance there are certain risks a Business will take when switching over to “The Cloud.” Use this Risk Insights to understand the exposures that come with moving some or all of your operations to a cloud computing server.

At Conrey Insurance we want to insure that you know the risks associated with moving your computing to a cloud based service. To speak with a member of the Conrey Team, call (877) 450-1872 or contact us and experience The Conrey Difference for yourself.

43 Percent of Cyber Attacks are Aimed at Small Businesses. Here’s How to Prepare.

Despite hearing about data breaches often while listening to the news, it is easy to believe that a small business will not be targeted. After all, wouldn’t there be more information to gather from big names like Amazon, Wells Fargo or Google? Though it may seem as though small businesses would be the last targets, they are often the easiest targets due to having insecure websites, fewer resources to quickly patch security issues, and the inability to fight back and recover after an attack. With this in mind, it is important that business owners have a recovery plan in mind. This plan can help save the reputation of your business while also reducing overall financial responsibility and saving you money in the long run. Here at Conrey Insurance Brokers, we’ve created a comprehensive guide to creating a response plan, which can be downloaded here. Here is a quick look so that you know what to expect when creating your plan and how to further protect yourself from vulnerabilities.

The 5 Phases

There are 5 phases that you will need to go through to develop a sufficient response to a breach. In the first phase, you will plan and prepare, making sure that others in your organization are aware of your response plan, tightening security, and forming a team to directly respond to the breach. In phase two, you will detect and report, being sure to look out for signs of a breach. Phase three will be the first phase dealing with the aftermath of an actual attack; it requires you to assess and decide both the severity of the breach and how to report it. You will then respond in phase four, neutralizing any threats and containing the incident. Finally, during phase five you will reflect on what could be improved in the future.

Responsibility – What You Are Obligated to Do After a Breach

Depending on what industry you are a part of, there may be laws regarding how businesses must handle security breaches. These laws outline when consumers must be told if they have been affected by a breach as well as to what extent. If your website accepts card payments, there are regulations outlined by the payment card industry called the Data Security Standards. Whether you process one credit card or many through your platform, it is important that you comply with these standards.

Insurance Options – How Can Cyber Liability Coverage Help Me?

For those who run the risk of data breaches, cyber liability insurance may be able to help mitigate some of the damages (both monetary and legal) that arise following a cyber-attack. For more information on what is covered, we invite you to review our blog article from September which covers everything you’ll need to know about Cyber Liability Insurance here.

Learn More

For a more in-depth review of these crucial aspects of cybersecurity and preparedness, download our free, comprehensive guide to navigating cybersecurity breaches, prevention, and recovery. You can download it here.

Here at Conrey Insurance Brokers, we stay ahead of the curve in order to help you mitigate the risks that pose a threat to your business; that’s The Conrey Difference. To review your business liability insurance, to check your liability coverage, or if you are interested in purchasing additional coverage, feel free to contact us. We will be happy to recommend an insurance solution that is designed to properly protect your business.

Call us at 1-877-450-1872 or contact us here, and experience the Conrey Difference for yourself.

 

Source: https://smallbiztrends.com/2017/01/cyber-security-statistics-small-business.html

Malware Protection Tips from Conrey Insurance Brokers

What is Malware and why is Malware protection important?

Malware is a general term that describes viruses, worms, Trojan horses, spyware, adware, rootkits, and other unwanted software or programs. Once a Malware program has gained access to a device, it can disrupt normal computing operations, collect information and control system resources.

We recently posted an article on the WannaCry virus, which was a Malware attack impacting businesses and government agencies around the world, including FedEx, Hitachi, and the National Health Service of Great Britain. The WannaCry virus requested around $300 from victims, and if no payment is made, threatens to double the amount after three days, and delete files within seven days. Once it infects one computer, it can spread to every computer in that network within seconds. This attack should highlight the importance of Malware protection for every organization and individual.

malware protection

Malware programs are being produced at an alarming rate and are often transmitted via emails, instant messages and website pop- ups. To protect your personal files from being stolen, deleted, or hijacked consider the following Malware protection tips:

  1. Avoid opening or replying to emails or text messages from unknown sources.
  2. Download files only from reputable sources whenever possible.
  3. Turn Wi-Fi, GPS and Bluetooth off when you are not using them.
  4. Do not share your mobile phone number on public websites and social networks.
  5. Avoid jailbreaking (modifying a device to remove manufacturer-imposed restrictions) your smartphone.

It is also important to have trusted anti-virus and anti-spyware programs installed on your devices. These programs should be set to perform scans on a regular basis for unwanted and harmful programs. Often, it is best to perform scans overnight when your computer is not in use. Being proactive with Malware protection can save you and your business unnecessary headaches and financial losses.

Since 1969, Conrey Insurance Brokers have been protecting the personal, commercial, and financial interests of our clients throughout Southern California. We are here to provide expert risk management solutions, ensuring your interests, loved ones, and financial future is properly protected.

Conrey Insurance Brokers is dedicated to building strong, lasting, and mutually beneficial relationships with our clients and community. The Conrey Team of experienced risk managers can assist you with your personal insurance, commercial insurance, life insurance, and financial services needs.

Conrey Insurance Brokers prides itself on being a one-stop independent insurance broker and financial services boutique that provides unparalleled expertise, professionalism, and service at a tremendous value.

Act today to ensure you are prepared for tomorrow. Contact the Conrey Team at 1-877-450-1872 or go to our website to get started on a free consultation today.