Local. Online. Most Quotes in Minutes!
Liability of YOUR Business
Malwares and viruses are infiltrated via the internet and attach themselves to your computer system without your knowledge or consent. Activity is monitored by keystrokes and user names/passwords and vital information can be easily stolen. Prevention starts with anti-spyware, anti-virus, and firewall software.
Today many companies conduct business online meanwhile cyber-criminal exploits run rampant.
The state of Texas requires companies to protect customer information by employing certain minimum safeguards.
Can your company afford to be at such a high risk?
Although basic prevention is readily available to any desktop, laptop and server, criminal hacking activity goes deeper.
Preparing your business with a line of defense is business-critical. When your company requires to log-in to a third party system or your in-house customer data base is left unprotected, it makes sense to protect your business and your customer information from hacking activity that can result in business interruption losses and lawsuits.
It is no longer safe to say, IF it happens but rather WHEN it happens, protection is key.
Hacking on the Rise ( 2012)
"Cyber espionage attacks US based companies." The hacking epidemic has caught media attention lately due to more online business opportunity through cloud computing or third party centers providing services remotely over the internet from any location. Outsourcing services helps a company achieve savings in cost but at the same time exposure to risks has increased in data security and privacy and business interruption. Sophisticated techniques are being used by criminals to fly under the radar of conventional prevention softwares.
- Sony. An "external intrusion" caused the Playstation Network to be offline for a period of time. Twice. Cost of repair to network system, credit card fraud and marketing/reputational costs $50 million. -PC World 2011
- Your financial institution notifies you when a breach occurs of your private information.
Lines of Defense-Hardware and Software
•Make sure your firewall is turned on and all your company’s software is up to date. That means everything from your operating system and your web browser to virus, spyware and malware detection software. Run frequent scans.
•Educate your employees about security procedures and policies.
•Change the default identifier and the administrative password that your router was shipped with.
•Use strong passwords for your employees – a complex combination of letters, numbers and symbols that are difficult for others to guess.
•Set your company’s system and browser security settings at medium or higher.
•Remove unnecessary data by eliminating it safely or storing it securely and regularly monitoring it.
•Have a network security audit performed to find out whether your company has any security vulnerabilities.
•Disable file sharing on company laptops used in the field. Make sure they have adequate security protection in case they’re lost or stolen.
•Make sure your company limits access to sensitive information in your network.(including social media.)
•Use a virtual private network solution for protection against hackers. VPNs encrypt the data traveling to and from your computers, making it invisible to hackers. That’s especially important when employees use personal or company laptops to conduct business at wifi hotspots and other unsecure networks.
•If your company is hacked, don’t try to hide it. Know your state’s data breach notification laws. They can require reporting breaches to customers and law enforcement officials in every state where you do business. -Private WiFi Sep 2011
Line of Defense When it cyber breach happens to your company and your customer's personal information is stolen, you can be sued for no added safeguards in place. Get the line of coverage in place. Talk to our rep for more information about this important coverage for your business.
When a cyber attack happens and customer information is stolen or other private information is breached, take important steps for agencies to investigate:
- File a report with the local police so there is a an official record of the incident.
- If your business has coverage, contact your insurance carrier to start an investigation.
- Report online crime or fraud to your local United States Secret Service (USSS) Electronic Crimes Task Force or the Internet Crime Complaint Center.
- Report identity theft to the Federal Trade Commission.
- You will need to contact all agencies associate with the stolen information (ie social security numbers-Social Security Administration.) FEMA 2013 ready.gov
When a Cyber Attack Happens
AGIS | PO BOX 448 | MAGNOLIA, TX 77353