skip to main content
Five Tips to Minimise Your Cyber Risk Exposures

Businesses have become more reliant on technology to operate but it is still people and our desire to trade that creates the exposures. Yesterday’s risks now manifest themselves very differently in today’s digitally connected world.

Patch Operating Systems

1. Patch Operating Systems

Sounds obvious but maintaining up-to-date operating systems and installing the patches does help. Using automated software can assist managing the patch cycle, but a regimented process certainly helps maintain operating system integrity.

Have An Incident Response Plan (IRP)

2. Have an Incident Response Plan (IRP)

An organization with a clear, concise and tested IRP will be able take fast action to contain a breach and minimize the financial damage to an organization. They are more likely to have a better response to legal requirements and potential costly fines.

Appoint A Chief Security Information Office (CISO)

3. Appoint a Chief Security Information Office (CISO)

Network and Data Security is an enterprise wide risk and not a risk that can be managed within the silo of the IT department. A CISO (or equivalent) should be responsible for data protection and have centralized responsibility for data management.

The CISO should lead and coordinate an enterprise’s response (General Counsel, Risk Management, PR/Marketing, Executive Management) to a cyber-attack. This person should be listed in the IRP.

Encrypt Data

4. Encrypt Data

With technologically empowered employees all accessing the network via a raft of mobile devices (smart phones, tablets etc.), a data/privacy breach can occur from simply losing a mobile device. Ensuring the devices are encrypted means that even if a device is lost or stolen, the data cannot be used which will mitigate the potential exposure.

Have A Network Security Policy

5. Have A Network Security Policy

A current and enforced network security policy should outline the organizational rules for appropriate use of an organization’s computer resources, including enforcement procedures.

The policy among other things should discuss strong password protocols, website access and usage restrictions, as well as appropriate email usage.

Want to Know More?

Taking stock and knowing your company’s risk exposures is the first step towards improving cyber resilience. With cyber security vulnerabilities everywhere, knowing how you can improve your company’s defenses and how to deal with the aftermath of an attack is more important than ever.

Read more about how Chubb can assist you in the preparation for and assistance after a cyber incident, or contact us to find out more.

Related Articles

Interested in this Chubb policy?

Have a question or need more information? Contact us to find out how we can help you get covered against potential risks