Category

Cybersecurity

Vulnerability Strikes Again: Broadcom WiFi chip likely used in your smartphone

By | Cybersecurity, OneBeacon Technology Insurance | No Comments

This post was authored by guest blogger Tushar Nandwana – OneBeacon Technology Risk Control Specialist. At the recent BlackHat security conference, a researcher named Nitay Artenstein from Exodus Intelligence disclosed a major security vulnerability called Broadpwn that would have affected 1 billion smartphones–on both the Android and Apple iOS operating systems. This far-reaching risk includes all iPhones since iPhone 5, Google Nexus (5, 6, 6X and 6P), Samsung Note 3 and Samsung Galaxy (S3 to…

Read More

Think Twice Before Using a Public Charging Station!

By | Cybersecurity | No Comments

Okay; we’ve all been there. You’re at the airport, wrapping up a successful business trip and your cellphone power is running low. You look around for a public charging station while you wait for your seating zone to be called. As you scan the crowded noisy terminal, you spot an open seat with a charging station right next to it. You are exhausted from your trip, your feet ache and you can’t believe your luck!…

Read More

How to be Safer When Using Public WiFi

By | Cybersecurity | No Comments

  This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Norman Thoms. – Read more here. Public WiFi spots are everywhere these days. They’re convenient, especially when you’re on the go, but they could also leave your information vulnerable. Here are some tips to stay safer if you use public WiFi. Avoid accessing confidential information When connected to public WiFi, don’t log on…

Read More

Cry No More: Avoiding the Risks of Ransomware

By | Cybersecurity | No Comments

  Last Friday, May 12, a rapidly moving global ransomware attack unfolded, primarily affecting  Europe and Asia but eventually making its way to the U.S. and South America. The ransomware strain was known either as WannaCrypt, WanaDecrypt or Wanna.Cry. Once a system was attacked, it would encrypt the files and request a ransom of $300 in bitcoin to decrypt the files and revert control. Estimates suggest that over 100,000  systems were rapidly infected worldwide. The variants hit the…

Read More

Warning: This new phishing scam is costing businesses thousands

By | Cybersecurity | No Comments

This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler, authored by Monique Ferraro. Whether it’s a phishing scheme or malware, most cyber attacks originate with an email. The most pervasive and costly cyber frauds affecting businesses this year are phishing schemes in which the perpetrator claims to be a senior executive, such as the CEO or CFO, requesting a funds transfer or employee W-2 records….

Read More

Cloud Computing: Business Opportunity or Data Threat?

By | Cybersecurity, Risk control, Safety Tips | No Comments

This post was featured in Equipment Connection – the risk management blog authored by our partners at Hartford Steam Boiler. In today’s world, we are surrounded by and enjoying the benefits of advances in technology. As mechanical, electronic and information technologies evolve and intertwine, so do the risks of breakdown and security breaches. One of the most substantial trends impacting businesses today, is “cloud” computing. What is the cloud? Cloud computing can be loosely defined as: Outsourcing what would…

Read More

Cisco Publishes Annual Cybersecurity Report

By | Cybersecurity | No Comments

Cisco recently published its 2017 Annual Cybersecurity Report. According to the study, over one-third of organizations that experienced a cyber breach in 2016 reported a loss of customers and revenues. When breaches occur, operations and finance were the functions most likely to be affected (36 percent and 30 percent, respectively), followed by brand reputation and customer retention (both at 26 percent). Acess the full report, including other highlights here.  

Read More

Ransomware Attacks: Stay Aware; Stay Alert

By | Cybersecurity | No Comments

Last week, several reports cited the unauthorized access to corporate databases through vulnerable platforms. The extortionists are demanding payments in exchange for the data, but apparently most data was not being returned upon payment of those ransoms. The initial attacks targeted databases running on MongoDB and then copycat attacks occurred on Elasticsearch servers. Our partners at BitSight alerted us to this matter and will continue to monitor and offer updates. Feel free to share this…

Read More

Pay Up or Else: Digital Piracy

By | Cybersecurity | No Comments

We’re pleased to share our teammate Joe Budzyn’s recent article on ransomware, which was published by Carrier Management. In this piece, Joe defines ransonware, outlines its inherent risks and offers steps for minimizing its impact. For more articles authored by OneBeacon Technology Insurance specialists, visit our website newsroom.

Read More

Stay Security Smart During the Holidays!

By | Cybersecurity, Risk control | No Comments

You may have heard the term “botnet” as relates to cybersecurity.  A botnet is a collection of devices that have been infected by a hacker’s program. Hackers routinely scan the internet looking for online devices and once identified, they are probed for security controls. If none are found, the hacker will install a program and add the device to their botnet. Over time, botnets can include millions of devices. Once a device is infected, the…

Read More