Category

Cybersecurity

Cybersecurity Smart

By | Cybersecurity, Safety Tips | No Comments

People continue to be the #1 cybersecurity risk–and can be the weakest link in the communications chain. All the technology savvy in the world cannot prevent someone from inadvertently clicking on a link. Remember, you are the first and last line of defense in effective cybersecurity.  Here are some of the latest scams to watch out for: Fake Google Docs – A message arrives in your Gmail account stating someone wants to share a Google document…

Read More

Protect Yourself From Ransomware Attacks

By | Cybersecurity, Safety Tips | No Comments

This post originally appeared in Equipment Connection, the Hartford Steam Boiler and Inspection Company’s (HSB) blog. It was authored by Monique Ferrarro, Cyber Practice Counsel at HSB. It’s increasingly possible that a hacker could seize control of your computer or data and demand a payment to give it back. These so-called “ransomware” attacks have unfortunately become far more common nowadays, and they’re one more reason that individuals and businesses should redouble their efforts to protect and secure…

Read More

Vulnerability Strikes Again: Broadcom WiFi chip likely used in your smartphone

By | Cybersecurity, OneBeacon Technology Insurance | No Comments

This post was authored by guest blogger Tushar Nandwana – OneBeacon Technology Risk Control Specialist. At the recent BlackHat security conference, a researcher named Nitay Artenstein from Exodus Intelligence disclosed a major security vulnerability called Broadpwn that would have affected 1 billion smartphones–on both the Android and Apple iOS operating systems. This far-reaching risk includes all iPhones since iPhone 5, Google Nexus (5, 6, 6X and 6P), Samsung Note 3 and Samsung Galaxy (S3 to…

Read More

Think Twice Before Using a Public Charging Station!

By | Cybersecurity | No Comments

Okay; we’ve all been there. You’re at the airport, wrapping up a successful business trip and your cellphone power is running low. You look around for a public charging station while you wait for your seating zone to be called. As you scan the crowded noisy terminal, you spot an open seat with a charging station right next to it. You are exhausted from your trip, your feet ache and you can’t believe your luck!…

Read More

How to be Safer When Using Public WiFi

By | Cybersecurity | No Comments

  This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Norman Thoms. – Read more here. Public WiFi spots are everywhere these days. They’re convenient, especially when you’re on the go, but they could also leave your information vulnerable. Here are some tips to stay safer if you use public WiFi. Avoid accessing confidential information When connected to public WiFi, don’t log on…

Read More

Cry No More: Avoiding the Risks of Ransomware

By | Cybersecurity | No Comments

  Last Friday, May 12, a rapidly moving global ransomware attack unfolded, primarily affecting  Europe and Asia but eventually making its way to the U.S. and South America. The ransomware strain was known either as WannaCrypt, WanaDecrypt or Wanna.Cry. Once a system was attacked, it would encrypt the files and request a ransom of $300 in bitcoin to decrypt the files and revert control. Estimates suggest that over 100,000  systems were rapidly infected worldwide. The variants hit the…

Read More

Warning: This new phishing scam is costing businesses thousands

By | Cybersecurity | No Comments

This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Monique Ferraro. Whether it’s a phishing scheme or malware, most cyber attacks originate with an email. The most pervasive and costly cyber frauds affecting businesses this year are phishing schemes in which the perpetrator claims to be a senior executive, such as the CEO or CFO, requesting a funds transfer or employee W-2 records….

Read More

Cloud Computing: Business Opportunity or Data Threat?

By | Cybersecurity, Risk control, Safety Tips | No Comments

This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler. In today’s world, we are surrounded by and enjoying the benefits of advances in technology. As mechanical, electronic and information technologies evolve and intertwine, so do the risks of breakdown and security breaches. One of the most substantial trends impacting businesses today, is “cloud” computing. What is the cloud? Cloud computing can be loosely defined as: Outsourcing what would…

Read More

Cisco Publishes Annual Cybersecurity Report

By | Cybersecurity | No Comments

Cisco recently published its 2017 Annual Cybersecurity Report. According to the study, over one-third of organizations that experienced a cyber breach in 2016 reported a loss of customers and revenues. When breaches occur, operations and finance were the functions most likely to be affected (36 percent and 30 percent, respectively), followed by brand reputation and customer retention (both at 26 percent). Acess the full report, including other highlights here.  

Read More

Ransomware Attacks: Stay Aware; Stay Alert

By | Cybersecurity | No Comments

Last week, several reports cited the unauthorized access to corporate databases through vulnerable platforms. The extortionists are demanding payments in exchange for the data, but apparently most data was not being returned upon payment of those ransoms. The initial attacks targeted databases running on MongoDB and then copycat attacks occurred on Elasticsearch servers. Our partners at BitSight alerted us to this matter and will continue to monitor and offer updates. Feel free to share this…

Read More