Understanding the cybersecurity risks of QR codes
Quick response (QR) codes are a popular marketing, sales, payment and customer service tool for several businesses. However, as the presence of QR codes has become more prevalent, malicious actors have found ways to use them in phishing attacks and to spread malware. These vulnerabilities can lead to significant financial and reputational damage, and it […]
Keys to the Kingdom – Protect your data by implementing multifactor authentication
The past two years have seen record-breaking levels of cyber crime and related losses. As technology becomes ever more integrated in society and criminals become more sophisticated, this trend can only be expected to continue. The common denominator in many successful attacks often boils down to one thing: human error. Whether it’s clicking the wrong […]
The essentials of cyber security
by Scott Schleicher, Underwriting Manager, Cyber & Technology – AXA XL With cyber attacks on the rise, it’s important for organizations to be ever vigilant in their part to support cyber security initiatives and protect the safety of their valuable assets. The piece below, by Scott Schleicher, reminds Preferred members of the potential impacts of […]
What you can do to prevent cyber attacks
In today’s digital landscape, cyber attack threats in the public entity space are mounting. The consequences of such attacks can disrupt essential public services and compromise sensitive data. It’s important to prioritize cybersecurity measures to safeguard critical infrastructure and data and help maintain public trust and confidence in the services provided. Read more on the […]
Thwart phishing scams and protect your data [infographic]
Preferred Cybersecurity Bulletin
Local governments face significant financial loss when a cyber attack occurs. Recently there has been a sharp increase in the number of reported cyber attacks that target local governments using stolen logins and passwords. Cybercriminals often rely on human error such as employees failing to install software upgrades or clicking on malicious links to gain […]
Cyber risks and liabilities: Responding to a data breach
No organization, big or small, is immune to a data breach. Many small employers falsely believe they can elude the attention of a hacker, yet studies have shown the opposite is true—a growing number of companies with fewer than 100 employees are reporting data breaches every year. Data breach response policies are essential for organizations […]
Cyber Risks and Liabilities – Email Security Best Practices
Since organizations rely heavily on email to communicate and conduct business operations, cybercriminals commonly target email as an entry point to access networks and breach valuable business data. In fact, 94% of malware is delivered by email, according to Verizon’s Data Breach Investigations Report. Following a cybersecurity breach, organizations may suffer financial, reputational and intellectual […]
How cybercriminals are weaponizing artificial intelligence
The past few years have seen artificial intelligence (AI) surge in popularity among both businesses and individuals. Such technology encompasses machines, computer systems and other devices that can simulate human intelligence processes. In other words, this technology can perform a variety of cognitive functions typically associated with the human mind, such as observing, learning, reasoning, […]
Preventing data theft by departing employees
When employees leave an organization there is a heightened risk of data theft, which is also known as data leakage or exfiltration. This risk is present whether an employee’s departure is voluntary or not. The consequences of data theft from insiders can be severe, as an organization’s most valued data assets and secrets are vulnerable. […]