For an optimal site experience, we recommend using a different browser.
Using Internet Explorer may prevent you from accessing, and some site features may not function as expected.

skip to main content

10 common gaps in cyber security

hand typing on laptop blue filter

As the number of cyber attacks increase steadily, businesses must step up their defenses to protect one of their most valuable assets – data. In order to do so, they need to know where their weaknesses are, before implementing measures to plug those gaps.

During the webinar, Tales from the Dark Web, Paul Jackson from Kroll highlighted the 10 gaps in cyber security that organizations face.


  1. Unpreparedness

    With the increase in frequency and complexity of cyber incidents in the region and worldwide, organizations cannot afford to be unprepared anymore. Organizations must test their defenses before a breach occurs, and be ready to respond when required. Failing to expect and respond to breaches will come at a high cost as organizations struggle to resume business.

  2. Unknown threats

    To be prepared, organizations must know what the threats are. Knowing the enemy and assets available is key. Beside keeping abreast of the latest developments, organizations can also get intel from the Dark Web to know where their threats are.

  3. Is it too late?

    Attackers may have infiltrated an organization’s network and are just waiting for the right opportunity to strike. It is recommended that organizations conduct active threat hunting to intercept these attempts, and stop attacks before they happen. Active threat hunting can be done if proper monitoring systems are in place, or via searches on the Dark Web to identify any weak links or exploited areas within the organization.

  4. Lack of monitoring

    In order to ensure that threats are identified early on, organizations have to ensure that they have the right monitoring solutions in place. Anomalous behavior on the network and endpoints must be flagged at the onset to minimize the organization’s vulnerability to attacks or fraud.

  5. Open to fraud

    Where processes involve human contact, they will be vulnerable to fraud and misuse. Without proper monitoring in place, these business processes may be compromised.

  6. Mobile / home / travel security

    In the modern organizations, employees commonly work on the go, or out of the office. This means that any form of cyber security implemented in the organization must be extended beyond the perimeters of the office. Mobile devices and laptops must be secured and employees have to be made aware of the risks and response plans.

  7. Third party / Vendor risks

    Beyond the organizations’ systems and employees, it is also vital to ensure that the third parties and vendors you work with have robust cyber security measures and policies in place. Organizations should put in place a regular and structured method to review and assess the security levels of these external parties to ensure that attackers are not able to exploit these loopholes to access the organization’s network.

  8. Incident handling

    When incidents do occur, organizations must ensure that they manage the crisis properly. A detailed crisis response plan should be in place, and well-rehearsed during “peaceful times” to ensure that everyone is aware of their roles and responsibilities. Mishandling of incidents can result in much higher costs and reputational damage, from which it may be challenging to recover.

  9. Internet of things (IoT)

    With increased connectivity across devices and systems via IoT, a once isolated attack is a much more serious issue these days. Attackers may be able to find ways to enter a particular system through another “door” which may be easier to access. This is tough to monitor, and disconnecting devices and systems is not even an option as the world continues to evolve.

  10. People risk

    Employees can be an organization’s weakest link, but also its greatest defense. A malicious staff may sell confidential information, or even allow attackers entry into the organization’s network. An ignorant employee may even unknowingly leave an “open door” for attackers. However, an employee who is aware of the risks and educated about signs to look out for in a breach, is an organization’s first line of defense. Ensure that employees are familiar with the risks and responses.


“Prevention is better than cure” is an apt saying here. All organizations, big and small, should be prepared for cyber breaches. Being able to identify and stop these attacks before they happen will save organizations from incurring substantial costs, and irreparable reputation damage. If an incident does occur, Chubb’s insureds can be assured of a swift and professional response plan that is part of the Cyber ERM policy. Read more about Chubb’s pre-loss services and incident response platform to find out more.


Learn more
Learn more

Tales from the dark web


Learn how criminals use the dark web, the myriad exposures it creates and why it’s important for organizations of all sizes to understand this digital underworld.


This content is brought to you by Chubb Insurance Malaysia Berhad, Registration No. 197001000564 (9827-A) (“Chubb”) as a convenience to readers and is not intended to constitute advice or recommendations upon which a reader may rely. Any references to insurance cover are general in nature only and may not suit your particular circumstances. Chubb does not take into account your personal objectives, financial situation or needs and any insurance cover referred to is subject to the terms, conditions and exclusions set out in the relevant policy wording. Please obtain and read carefully the relevant insurance policy before deciding to acquire any insurance product. A policy wording can be obtained at, through your broker or by contacting any of the Chubb offices or Chubb agents. Chubb makes no warranty or guarantee about the accuracy, completeness, or adequacy of this content. It is the responsibility of the reader to evaluate the quality and accuracy of material herein.

© 2023 Chubb. Not all coverages available in all jurisdictions. Chubb® and its respective logos, and Chubb. Insured.SM are protected trademarks of Chubb.

Contact us
Contact us

Have a question or need more information?

Contact us to find out how we can help you get covered against potential risks