We would love to hear from you. Click on the ‘Contact Us’ link to the right and choose your favorite way to reach-out!

wscdsdc

media/speaking contact

Jamie Johnson

business contact

Victoria Peterson

Contact Us

855.ask.wink

Close [x]
pattern

Industry News

Categories

  • Industry Articles (21,225)
  • Industry Conferences (2)
  • Industry Job Openings (35)
  • Moore on the Market (420)
  • Negative Media (144)
  • Positive Media (73)
  • Sheryl's Articles (803)
  • Wink's Articles (354)
  • Wink's Inside Story (275)
  • Wink's Press Releases (123)
  • Blog Archives

  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • May 2011
  • April 2011
  • March 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • August 2009
  • June 2009
  • May 2009
  • April 2009
  • March 2009
  • November 2008
  • September 2008
  • May 2008
  • February 2008
  • August 2006
  • Insurance Industry Must Confront Data Breaches on Two Fronts

    July 18, 2016 by Gary S. Miliefsky

    While protecting others from a menu of breaches, industry must also protect itself

    The overwhelming number of data breaches over the last few years has every private company and government agency desperately trying to guard its system against cyber criminals.

    But unlike most other professions, the insurance industry is affected in two ways by the threat.

    Insurance companies themselves can be the target of a breach that would shut down their network, at least temporarily, or put the personal and private information of customers at risk.

    At the same time, insurance companies that offer cybersecurity policies can be impacted by how well their customers protect their own systems.

    Smelling a RAT

    How costly can these breaches be? The average is $4 million per breach, up from $3.8 million in 2015, according to a study from IBM and Ponemon Institute.

    “That’s a staggering amount,” says Gary S. Miliefsky, CEO of SnoopWall (www.snoopwall.com), a company that specializes in cybersecurity.

    “The good thing is that those in the insurance business are starting to realize just how serious the problem is and that, just like the businesses they insure, they face costs not only in terms of the breach itself, but also in terms of their firm’s reputation.”

    Sometimes those breaches are ridiculously easy, Miliefsky says. A cyber criminal can gain access by sending a company an email with an attachment called a Remote Access Trojan, or RAT, that looks like a normal file. All it takes is for an unsuspecting employee to open that file and security is compromised.

    “Certainly, hackers can be very clever and very skilled, but often all they need to be is patient,” Miliefsky says.

    Awareness, Training & Defense

    For better protection against those cyber criminals out to do harm, Miliefsky says insurance companies should:

    • Train their staffs
      Those employees sitting at their computers each day are a company’s first line of defense. If they click on an attachment or a link in the wrong email, they have essentially unlocked the front door. Employees should be made aware of the dangers and told what do about suspicious email.
    • Routinely update their defenses
      Outdated technology and outdated security software make a company’s computers vulnerable to attack. It’s important that insurance companies periodically review their IT operations to make sure what worked last year still provides the needed security.

      A cyber criminal can gain access by sending a company an email with an attachment called a Remote Access Trojan, or RAT, that looks like a normal file
    • Enforce better password management policies
      Employees often aren’t creative enough with their passwords, making it easier for cyber criminals to work their way in. In setting a password, employees should use any unique characters they can think of, such as a dollar sign ($) or an exclamation mark (!) or replace a letter “O” with a 0 (zero). Employees also should be directed to change their passwords often.
    • Manage Their Intranet
      Most breaches happen behind firewalls. You’ll need more than antivirus to stop the bad guys. This includes anti-phishing tools, network access control (NAC), zero-day malware quarantining and other next generation approaches focusing on the root cause of how you get breached.
      Without a NAC solution, you won’t be able to tell who is on your network, including if the cleaners are plugging in a laptop at midnight or if a consultant is on the wrong VLAN, like HR or Payroll where you don’t want them to have access. In addition, you should find and fix all your common vulnerabilities and exposures (CVEs). Learn more about them at the National Vulnerability Database at nvd.nist.gov or cve.mitre.org. By finding and fixing your holes, you’ll have a stronger, less exploitable infrastructure.
    • Be prepared for the worst
      It’s essential to have a backup and recovery plan in case data is lost or corrupted. That plan should be tested frequently.

    “Because of their unique position, insurance companies also should make sure that their cybersecurity policy holders are taking these steps to protect themselves as well,” Miliefsky says. “This is definitely a situation where an ounce of cyber prevention is worth a pound of cure.”

     

     

    About Gary S. Miliefsky

    Gary S. Miliefsky is founder of SnoopWall Inc. (www.snoopwall.com), a cutting edge counter-intelligence technology company offering free consumer-based software to secure personal data on cell-phones and tablets, while generating revenues helping banks and government agencies secure their networks. He has been active in the INFOSEC arena, as the Executive Producer of Cyber Defense Magazine and a regular contributor to Hakin9 Magazine.

    – See more at: http://www.lifehealth.com/insurance-industry-must-confront-data-breaches-two-fronts/?utm_source=iContact&utm_medium=email&utm_campaign=e-newsLink&utm_content=impact#sthash.KRjBpPbc.dpuf

    Originally Posted at Advisor Magazine on July 18, 2016 by Gary S. Miliefsky.

    Categories: Industry Articles
    currency