Managing End-of-Life Software
At some point, all software will reach the end of its life. This means manufacturers will no longer develop or service the product, discontinuing all technical support, upgrades, bug fixes and security fixes. As a result, end-of-life (EOL) software will have known vulnerabilities that cybercriminals can easily exploit. This article discusses the risks of continuing to use EOL software and discusses best practices for organizations to mitigate this risk. Risks of EOL Known but unmitigated vulnerabilities are among the highest cybersecurity risks. One survey found that 60% of data breaches stemmed from unpatched known vulnerabilities. Another report found that 3 of 4...
The Importance of Two-Factor Authentication
As cyber attacks become more and more common, protecting your data is increasingly difficult. In fact, a study from Juniper Research found that by 2023, cyber criminals are expected to steal an estimated 33 billion records. In light of the growing number of cyber attacks, many companies are turning to two-factor authentication (also commonly called 2FA or multifactor authentication) to enhance their cyber security. While no cyber security method is foolproof, using two-factor authentication can add an extra layer of security to your online accounts. So how exactly does two-factor authentication work? What Is Two-factor Authentication? While complex passwords can help deter cyber...
Cyber Risk Guide for Boards of Directors
Before examining what boards can do to manage cyber risk, organizations need to understand who cybercriminals are, what they want and what’s at stake. In today’s hyper-connected world, nearly every business has some form of cyber exposure. Whether you process payments or store sensitive customer information, chances are cybercriminals have already placed a target on your organization and are primed to strike. Arthur Hall Insurance offers this guide designed for an organization's board members to plan for and respond to cyber incidents. Please contact one of the professional insurance advisors at Arthur Hall Insurance to discuss potential cyber risk. ...
Business Email Compromise
Cybercriminals continue to become more sophisticated, leveraging a wide range of tactics in order to attack their victims. One tactic that has increased in frequency, complexity and resulting losses over the past few years is the use of business email compromise (BEC) scams. Put simply, a BEC scam entails a cybercriminal impersonating a seemingly legitimate source—such as a senior-level employee, supplier, vendor, business partner or other organization—via email. The cybercriminal uses these emails to gain the trust of their target, thus tricking the victim into believing they are communicating with a genuine sender. From there, the cybercriminal convinces their target to...
Cyber Risk – SolarWinds Orion Advisory
The Arthur Hall Insurance team is following the cyber insurance ramifications of the SolarWinds Orion Supply Chain Cyber Incident. FireEye, a cyber-security company, discovered this large cyber incident in December and the extent and scope of the occurrence is still unfolding. malware used in this cyber intrusion is also known as SUNBURST. The hackers compromised SolarWinds Orion software, which in turn impacted a large amount of government entities and private companies. We are providing this notice due to the size of this incident as well as the cyber insurance marketplace response. If you have not already done so, we recommend you contact...