How to protect yourself from cybercrime

How to protect yourself from cybercrime

While you’re on your phone or laptop, would you like a crash course on cybercrime and how you can be protected? If the answer is no, then you probably already have cyber insurance cover on your business or home. If yes, read on...

What is cybercrime?
Basically, it is identity theft, online scams, cyberbullying and financial fraud, committed via computers or other digital devices.


Who does it relate to?
These numbers tell the story. Maybe you are less exposed if you live in a cave, off the grid in the middle of Australia with no phone and internet. But even then, you have some details recorded on the internet like your Tax File Number, and registered address for your cave…

sourced from Emergence

Even if you take out cyber insurance, what are your responsibilities?
Don’t re-use passwords or share passwords. Make sure to use multi-factor authorisation, like when you get a verification code as an SMS. Aside from that, generally, be vigilant, ensure you’ve installed good anti-virus software on your devices and don’t open links you’re unsure of. We can all do more, but this is a good start

Small business claim example

Compare Cyber Insurance Policies 5 Staff

Compare Cyber Insurance Policies $1M turnover

BACKGROUND

The Insured’s employee inadvertently misplaced a company laptop, which contained a list of 1000 client tax records and credit card details.

OUTCOME

A total cost of $250K was paid for the cost of notifying the affected individuals and the privacy commissioner of the data breach. This also included the costs incurred in retaining a Public relations firm to assist the insured in re-establishing their business reputation. 

Payment: $250,000

Cyber Crime

If you’re reading this article and you’ve never thought about protecting yourself, your family or your business against cyber offences,

Share This Post

More To Explore

News

Lloyd’s requirement for cyber war exclusion in Cyber Insurance policies is now a reality

By March 2023, all cyber policies written by Lloyd’s Syndicates and Lloyd’s coverholders must include suitable war exclusions for losses resulting from state-backed cyberattacks, as announced by Lloyd’s in August 2022. With this mandate in mind, the Lloyd’s Market Association (LMA) developed four model cyber war exclusions as market standards. These exclusions exclude “cyber operations” and “war”, both defined terms in the exclusions. The cyber war exclusion replaces long-standing war exclusions that lacked modern definitions and have become less relevant in the cyber world.

News

What Is the Essential Eight Maturity Model

The Essential Eight Maturity Model is a framework developed by the Australian Cyber Security Centre to guide organizations in improving their cybersecurity posture. The model consists of eight mitigation strategies, including application control, patching applications, patching operating systems, privileged access management, endpoint protection, data backup, limiting lateral movement, and multi-factor authentication. The model is designed to help organizations assess their current level of maturity in implementing these strategies and provides guidance on steps to take to improve their cybersecurity posture. The mitigation strategies are considered essential because they can effectively address the most common cyber threats.