Refresh your Cyber Security habits

3 Tips for Cyber Security

Cyber security may not be the most exciting topic, but it is extremely important and it is everyone’s responsibility. There are some really basic things you can do to really increase your own security, both when doing business, as well as in your personal life.

Cyber Security

Cyber Security Tips

3 Tip for Cyber Security

Cyber security may not be the most exciting topic, but it is extremely important and it is everyone’s responsibility. There are some really basic things you can do to really increase your own security, both when doing business, as well as in your personal life.

Don’t reuse passwords

I’m sure you hear this one a lot, but a lot of times it’s not explained why!

Let’s say you sign up for the website www.reallyfancyclothes.com to do some shopping. You use your Gmail email address and the same password as the email address. Two months later, news breaks that reallyfancyclothes.com had their customer database hacked and all emails and passwords were stolen.

These hackers will use programming to test all those email/password combinations. Within a few minutes, they are in your Gmail account, because you haven’t secured it with multi-factor authentication!

Now that these hackers are in your Gmail, they are able to see what other websites you’ve signed up for. They can start either logging in using that same stolen password or doing a password reset to your email that they are logged into. Soon, all your accounts are stolen and you’re completely locked out of everything!

Always use Multi-Factor Authentication

You’ll notice in the above that I specified that the hackers were able to enter due to no Multi-Factor Authentication (MFA).

This is critical and is one example of why IT people use the term “defence in layers”.

Should you make the cardinal mistake of reusing passwords, you may still be saved by having MFA.

You will be familiar with this, it’s where you get a text with a one-time-use code, or you need to open an authentication app to get a short-lived code. MFA is not fool-proof, and there have been cases of people using social engineering to bypass these – but that’s why you have layers of security!


Never share passwords

Sometimes it may seem super easy and convenient to give your password to someone to log into your computer for you, but this is another cardinal sin of cybersecurity.

Once someone else knows your password, your account is no longer considered secure. You never know how that person is keeping that password (Did they write it down on a sticky note on their screen? Are they giving it to someone else to log in to?), and you can never know exactly what they will do under your login. And it’s not a stretch to imagine that someone working nearby may overhear your password, and then they can log into your account and wreak havoc!

 

David Boyes

Ausure’s Cyber Security Team Lead

Compare Cyber Insurance Policies

Compare leading Australian Insurers like AIG, Allianz, Brooklyn Underwriting, CGU, Chubb, Dual, Emergence and Zurich.

Compare Quotes

Zurich – the ins and outs of cyber risks

Cyber risks

Zurich Cyber Insurance

Cyber insurer Zurich‘s Global Head of Special Lines Lori Bailey has published an article outlining the ins and outs of cyber risks.

See where cyber risks originate, how they accumulate and how they can derail mission critical aspects at every level of your business.

kh-image-the-ins-and-outs-of-cyber-risks

The consequences of cyber risks can disrupt critical business infrastructure and derail productivity at the operational level. Here’s a complete look at where they originate, what they target and their consequences.

Cyber Risk Sources

  • Human error accounts for 52 percent of cyber breaches, according to a study by CompTIA.
  • Creating resilience to cyber risks requires focus on educating and training employees

kh-image1-the-ins-and-outs-of-cyber-risks

CyberRisk Targets

  • Indirect targets of cyber encroachments are as significant as direct targets.
  • Access to financial information, for example, could put at risk the financial information of a private company that is a customer.
  • This underscores the need for a holistic view of cumulative cyber risks.

kh-image2-the-ins-and-outs-of-cyber-risks

CyberRisk Consequences

  • The consequences of cyber risks are not limited to lost data.
  • Transactions can fail; supplies or products can be misdirected.
  • Manufacturing can be halted or output faulty goods; safety issues can cause injuries.
  • Dissatisfied customers can turn elsewhere.

kh-image3-the-ins-and-outs-of-cyber-risks

Source: Zurich

Speak to one of Insure 247’s brokers on 1300 046 787

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrant the accuracy of any information contained therein, readers should make their own inquiry’s before relying on information in the stories Terms of Service

Cyber Insurance Comparison

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation, and needs