Contacts
As if grappling with unprecedented times, a world health crisis, and unsettling events isn’t enough -- organizations have yet another concern; increased cyber risk. While organizations continue to pivot operations and adapt new technologies, so do cyber criminals. Here are some steps you can take to resiliency:
- Lead with privacy and security as your top priorities. A proactive approach to evaluating your risk and understanding your exposures will dramatically improve recovery and resiliency when dealing with a cyber incident.
- Understand your exposure and amplify your due diligence process as your organization embraces new platforms and partnerships, and revisits existing partner agreements. Measure your partners and supply-chain based on their privacy and security policies and onus of responsibility. Be sure your partners value privacy and security as you do. Don’t be afraid to dissolve a long-standing relationship because your security goals do not align. Engage partners to assist in reviewing and enacting security requirements that are aligned with your organizations specific privacy and security goals.
- Employ recommended frameworks and best practices to identify and implement network and system safeguards. You have the ability to decrease the impacts of a cyber-incident, for example, by securing access to only those authorized, require multi-factor authentication, encrypt sensitive data, provide training, back-up regularly and apply required updates. Organizations that implement a cyber risk strategy strengthen their posture and readiness to respond and recover from a cyber incident.
- Awareness and training is essential, continually reiterate the risks and importance of cybersecurity and each employees’ responsibility to protect the organization and minimize the threats. Update employee use policies to include the work from home environment. Always foster an open culture of reporting possible threats to enable employees and partners to feel comfortable in informing the appropriate parties that an incident may have occurred, as quickly as possible.
Cyber incidents are complex and may be difficult to understand and navigate unless you have fallen victim. Keep your organization from suffering a significant financial and reputational loss and improve your cyber posture by having a cyber-risk strategy in place.
At Marsh & McLennan Agency (MMA) we have the expertise and resources to improve your organization’s cyber posture and to insure exposures. By working with MMA, we will help you assess your risk, determine a cyber policy that is best for your organization, and work together to protect your enterprise today, and in the future. Contact your local MMA representative today for more information.
You May Also Be Interested In
- Blog
12.23.2020
Solarwinds Cyber Incident
- Blog
10.19.2020
Client Advisory: Increasing Cyber Risks in the Transportation Industry
- Blog
10.16.2020
Client Advisory: Dealing with Increasing Cyber Risks in the Biotech Industry
- Blog
10.14.2020
Client Advisory: Dealing with Increasing Cyber Risks in Manufacturing
- Blog
10.12.2020
Client Advisory: Dealing with Increasing Cyber Risks in the Health Care Industry
- Blog
10.09.2020
Client Advisory: Dealing with Increasing Cyber Risks in the Construction Industry
- Event
10.08.2020
Webcast | A Tale of Two Breaches
- Blog
10.07.2020
Cybersecurity: Managing Risk in the COVID-19 Era
- Blog
10.05.2020
Why HR is a Key Stakeholder in Cyber Risk Management
- Blog
10.02.2020
Network Security & Privacy Considerations When Organization Shift from WFH to Office Environment
- Blog
09.30.2020
Elements of Cyber Insurance Coverage
- Blog
09.28.2020
Cyber Security and Privacy Concerns: COVID-19
- Event
09.16.2020
Webinar | Cyber Incident Response
- Event
07.14.2020
Webinar | Cyber Security-The Complex & Inevitable Exposure
- Event
06.25.2020
Webcast | Navigating the Cyber Liability as Organizations Return to the Workplace
- Blog
04.27.2020
Client Advisory: Dealing with increasing retail cyber risks during the COVID-19 crisis
- Blog
01.08.2020
The 2020 Cyber Outlook
- Event
10.15.2019
Webinar | New Cyber Privacy Regulations & Risks Affecting U.S. Businesses
- Blog
10.07.2019
The State of Cyber Security
- Blog
09.03.2019
12 Best Practices to Secure and Protect Passwords
- Blog
03.11.2019
Protect Your Business from these 5 Cybersecurity Risks
- News
12.21.2018
Social Engineering Fraud
- Blog
12.19.2018
Does Your Company Know What To Do After a Cyber-Attack?
- Blog
11.26.2018
Five Critical Risks Impacting Public Sector Organizations Today
- Event
10.25.2018
Framework of a Cyber Breach
- Blog
10.19.2018
IoT-connected Devices Are Increasing Cyber Risk Exposure
- Blog
09.04.2018
15 Best Practices to Protect Your Website From Malware & Cyber-Hacking
- Blog
08.28.2018
Why Manufacturing Companies are Now More Susceptible to Data Breaches
- Blog
06.19.2018
2018 Cyber & Data Security Risk Survey Report
- Blog
05.08.2018
GDPR is Coming. Are You Ready?
- Blog
04.04.2018
Electronic Logging Devices - A Hacker's New Window?
- Blog
10.06.2017
The 4 Myths of IT Data Security
- Blog
09.15.2017
Cyber Breach - Equifax
- Blog
06.08.2016
2015 & 2016 Cyber & Data Security Risk Survey Report