article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Erin: What are some of the biggest cyber threats that businesses face today? Byron: The economic impact of phishing, ransomware, business logic hacking, Business Email Compromise (BEC) and Distributed Denial of Service (DDoS) attacks continues to be devastating. Erin: What role does human error play in cybersecurity incidents?

article thumbnail

Cybersecurity in 2020

Cytelligence

The variety show of phishing attacks – While email remains number one for phishing attacks, cybercriminals are also using a variety of other attack routes to trick their intended victims into giving up personal information, login credentials, or even sending money.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Policy debate: the pros and cons of cybersecurity insurance

BH Consulting

Often, they also want bidders to produce supporting documents like the executive summary of a penetration test report. Sometimes, contracts or proposals ask suppliers for both cybersecurity insurance and documented security controls. What security measures will the insurance company ask you to have?

article thumbnail

Ransomware in 2020

Cytelligence

Threat actors attack tactics include the following: Phishing – using a phishing email the workstation is infected and access provided to the ransomware threat actors. Unfortunately, the citizens of the country had to pay the ransom as the city had no cyber insurance. Learn more about the different ransomware variants.

article thumbnail

Scanning for Flaws, Scoring for Security

Krebs on Security

companies with the Cyber Risk Score, and then invited these companies to sign up and see how their score compares with that of other organizations in their industry. The stated use cases for the Cyber Risk Score include the potential for cyber insurance pricing and underwriting, and evaluating supply chain risk (i.e.,

article thumbnail

Ransomware Prevention, Detection, and Simulation

NetSpi Executives

Attackers guess the passwords easily, find them in open source code repositories, or collect them via phishing. Some can’t afford not to pay, and some are covered by cyber insurance. Should I get a ransomware cyber insurance policy? Many organizations have used cyber insurance to recover from ransomware attacks.

article thumbnail

How to Recover From a Ransomware Attack

eSecurity Planet

Paying for internal assessments and penetration tests by a third party can provide fresh thinking and a level of assurance for stakeholders such as customers, the board of directors, and the insurance company that wrote our cyber insurance policy. Next, assess the situation.