Effective Cybersecurity Requires Both Cyber Training & Insurance Cover

The amount of data stored on-line in the US doubles just about every year, making ever more trade secrets, personal and confidential business data potentially exposed to hacking and theft. 

Effective cybersecurity training for staff and management often does not take place often enough to keep employees up-dated with the current scams and hacks. Cyber insurance has been operating in this area for some time but the commercial industry has not taken the threats seriously and often does not take adequate cyber insurance. 

Only around 15% of large US companies have adequate cyber insurance and only 5% of small and medium sized business have coverage. Cyber-attacks on commerce has increased and cybercrime in the US is now costing almost $158B every year in North America. 

The same issues and lack of insurance cover is also affecting the EU. Some of the cyber insurance cover businesses we spoke with recently have said the problem has not been properly dealt with by most companies in the UK where over 50% of national crime is now cyber related and is costing the UK economy around £30B. 

Often the IT department management will tell their board that they have very adequate cyber systems protection and that their firewalls are very effective. Yet often this not the case and time and again hackers find ways to penetrate IT systems and steal data information and money. 

The reason the IT department say this is because they do not want to appear IT weak and often they have not had an independent IT audit and therefore they do not have a complete understanding of the cyber risks involved. Often old systems are still connected to the current more un-dated systems and this means that hackers can find a way into the whole system and add malware or steal data and cash.

A defensive attitude from IT leaders does not in any case protect organisations against insider threats.

Cyber audits should become something that is legally binding similar to financial audits which once they were legally employed this reduced the financial crime rate. Furthermore, most companies do not have adequate cyber training for its employees and senior management. 

Adequate professionally- conducted cyber training greatly reduces the likelihood of phishing emails getting into the system and allowing hackers to get the data and information they require for a successful cyber-attack.

For more information: please contact Cyber Security Intelligence.

You Might Also Read:

Why Cyber Training Is So Important For Business:

 

 

« Attack On Ukraine's Power Grid Targeted Transmission Stations
Old Magecart Domains Come Back To Life »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Fox-IT

Fox-IT

Fox-IT prevents, solves and mitigates the most serious cyber threats with smart solutions for governmental bodies, defense, law enforcement, critical infrastructure, banking and large enterprises.

Logz.io

Logz.io

Logz.io is an AI-powered log analysis platform that offers the open source ELK Stack as a enterprise-grade cloud service with machine learning technology.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Go Grow

Go Grow

Go Grow is a business oriented accelerator program at Copenhagen School of Entrepreneurship. Targeted technologies include IoT, AI and Cybersecurity.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.