Sadly, individuals and employees across the globe have found themselves in vulnerable situations due to cyber attack incidents occurring during lockdown. The situation was accelerated by changes in the way in which we communicate online, between colleagues and associates, which inevitably went beyond just sending an email.

Hackers have sought to exploit our experience through this time of extreme change, circulating the likes of phishing emails which have falsely posed as a legitimate source and have encouraged urgent action through criminal activity. Virtual meeting rooms have also been a target for cyber attack incidents where hackers have been given the opportunity to enter in and to open conversations without permission.

Furthermore, inside threats are also an ongoing concern for Directors. With some companies now facing closure or having to reduce employment numbers and lay off staff, keeping systems safe against disgruntled redundant staff means that cyber attack incidents can be initiated within their own working environments; much closer than they originally presumed.

Risk assessment to reduce cyber attack incidents

To counteract this type of unscrupulous activity, business leaders should carry out a full investigation and risk assessment as to how employees are accessing systems, what technology they are using and how they are communicating. Understanding these pathways will allow organisations to build up a picture as to how the company operates in accordance to all staff. This type of framework should also make isolating cases much easier and if a member of staff leaves the business, then access passwords and the closing down of services can be updated with immediate effect.

To find out more about combating against cyber attack incidents and minimising risk within your business or organisation please contact our team at Crendon Insurance. Through our Cyber Security questionnaire, company owners can risk assess their business easily, so as to implement the correct level of cyber security protection by using cyber attack insurance.
Blogs used to write this article: