{"id":1691,"date":"2017-11-07T17:58:30","date_gmt":"2017-11-07T16:58:30","guid":{"rendered":"https:\/\/nicolacolucci.com\/?p=1691"},"modified":"2019-05-22T18:45:44","modified_gmt":"2019-05-22T16:45:44","slug":"cyber-risk-the-threat-may-come-from-our-employees","status":"publish","type":"post","link":"https:\/\/nicolacolucci.com\/en\/2017\/11\/07\/cyber-risk-the-threat-may-come-from-our-employees\/","title":{"rendered":"Cyber risk: the threat is inside our company"},"content":{"rendered":"<p><strong>C<\/strong><strong>omputer frauds, viruses, data and identity theft, misuse of credit cards, cyber attacks on our computers: these are some of the major threats that affect businesses all over the world on a daily basis, such as hospitals, multi-utilities, law and auditing firms.<\/strong><\/p>\n<p><strong>Most of these intrusions are coming from within the company and could even be caused by unfaithful employees.<\/strong><\/p>\n<p><strong>Preventive and control measures, IT experts, cyber insurance: are the three strategies that a business should invest in nowadays.<\/strong><\/p>\n<p>Control your digital behaviour! This is the main message sent to entrepreneurs and risk managers by <a href=\"https:\/\/dailynewshungary.com\/budapest-host-international-festival-ethical-hackers-hacktivity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hacktivity<\/a>, the International Forum on Digital Security that I recently attended in Budapest Hungary.<\/p>\n<p>Numerous experts and IT engineers gathered from all over the world to discuss how to protect businesses from daily computer scams.<\/p>\n<p>It has been agreed from the start, that <strong>European companies have proved to be very vulnerable to cyber intrusions.<\/strong><\/p>\n<p>The above statement is confirmed by <a href=\"https:\/\/www.rapid7.com\/info\/national-exposure-index\/\" target=\"_blank\" rel=\"noopener noreferrer\">this research of 2016<\/a>.<\/p>\n<p><img alt=\"A world map highlighting the top 40 countries most vulnerable to cyber attacks and cyber risk, with country names in red text, ranked from 1 (Belgium) to 40 (Vietnam) on either side of the map background.\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1692\" src=\"https:\/\/nicolacolucci.com\/wp-content\/uploads\/CqtVao3VIAAQfSL-1.jpg\" alt=\"\" width=\"680\" height=\"355\" srcset=\"https:\/\/nicolacolucci.com\/wp-content\/uploads\/CqtVao3VIAAQfSL-1.jpg 680w, https:\/\/nicolacolucci.com\/wp-content\/uploads\/CqtVao3VIAAQfSL-1-300x157.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>What stands out from the research, is that nowadays some Central European countries are affected more by cyber crime than others such as Denmark, Luxembourg, Israel, Cyprus, Germany, Switzerland, Singapore, Vietnam.<\/p>\n<p><strong>Hungary<\/strong> has suffered the largest number of cyber attacks right after Turkey, closely followed by <strong>Czech Republic, Lithuania, Ukraine, Slovenia, Austria and Croatia.<\/strong><\/p>\n<p>In <strong>Romania<\/strong>, Dacia&#8217;s production has recently been compromised by a <a href=\"http:\/\/www.business-review.eu\/news\/dacia-production-in-romania-partially-crippled-by-cyber-attack-wannacry-infection-suspected-137678\" target=\"_blank\" rel=\"noopener noreferrer\">violation of computing systems<\/a>, while in <strong>Poland<\/strong> the government has announced that <a href=\"http:\/\/www.thenews.pl\/1\/9\/Artykul\/313738,Polish-PM-calls-crisis-meeting-over-cyber-attacks\" target=\"_blank\" rel=\"noopener noreferrer\">dozens of companies and banks<\/a> have been attacked by hackers whose identity is still unknown.<\/p>\n<h2>On the web, who can we really trust?<\/h2>\n<p>How often is it that i<strong>n good faith and with imprudence<\/strong>, we download an update or anti-virus file from one of our favourite web-sites?<\/p>\n<p>Have we never received a <strong>suspicious friendship request<\/strong> on our social network platform?<\/p>\n<p>From all the emails received daily from well-know organisations (such as banks or web service portals, phone companies, online auctions portals, email providers and social networks) <strong>how many is sent by people that we actually know?<\/strong><\/p>\n<p>Cybercrime can affect our PC and mobile devices in various forms. <strong>Our good faith and inexperience<\/strong> can result in failure to identify suspicious emails, notifications or contact requests.<\/p>\n<h2>What is the common point of these attacks?<\/h2>\n<p>We can find plenty of detailed descriptions of today&#8217;s most common computer attacks on the web. <strong>The main problem with identifying a cyber attack is that we are often not aware where and\/or who they come from.<\/strong><\/p>\n<p>These intrusions can be carried out by criminals who are hundreds or even thousands of miles away from our office.<\/p>\n<p><strong>However, we should also consider\u00a0that most of these threats are perpetrated by the staff working in our company.<\/strong><\/p>\n<p>As confirmed during the Budapest International Forum and by an <a href=\"https:\/\/securityintelligence.com\/this-just-in-read-all-about-it-an-ibm-survey-of-the-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">IBM research of 2015<\/a>, the most affected sectors &#8211; Food, Manifacture, Financial &#8211; <strong>are exposed to threats from within the company.<\/strong><\/p>\n<p><img alt=\"Un grafico a ciambella intitolato &quot;Insider Threats Account for 60% of All Attacks&quot; evidenzia il rischio cyber nel 2015: 40% degli attacchi da parte di esterni e 60% da parte di insider - 44,5% malintenzionati, 15,5% attori involontari.\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1607\" src=\"https:\/\/nicolacolucci.com\/wp-content\/uploads\/insider-threat.png\" alt=\"\" width=\"1415\" height=\"827\" srcset=\"https:\/\/nicolacolucci.com\/wp-content\/uploads\/insider-threat.png 1415w, https:\/\/nicolacolucci.com\/wp-content\/uploads\/insider-threat-300x175.png 300w, https:\/\/nicolacolucci.com\/wp-content\/uploads\/insider-threat-1024x598.png 1024w, https:\/\/nicolacolucci.com\/wp-content\/uploads\/insider-threat-768x449.png 768w\" sizes=\"auto, (max-width: 1415px) 100vw, 1415px\" \/><\/p>\n<h2>How?<\/h2>\n<p><strong>1.Unhappy and helpless human resources.<\/strong><\/p>\n<p>The lack of familiarity\/experience in recognizing new web intrusions and how to react properly in the event of an attack to our IT systems means that employees, external collaborators and consultants are the most vulnerable groups within the business world.<\/p>\n<p>Our Human resources, <a href=\"https:\/\/www.cio.com.au\/article\/619287\/employees-clueless-about-data-breach-procedure-deloitte-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">as Deloitte says<\/a>, unknowingly leave themselves vulnerable to these cyber attacks, becoming the preferred target of unscrupulous hackers <strong>without them or their employer being aware of it in time.<\/strong><\/p>\n<p><strong>2.Unfaithful employee.<\/strong><\/p>\n<p>The most surprising and alarming issue is that these attacks can also be voluntarily committed by the employees of the company.<\/p>\n<p>This is the result of a <a href=\"https:\/\/www.ibanet.org\/Article\/NewDetail.aspx?ArticleUid=64955210-06ce-4d8f-b2de-83fd1c0d86f6\" target=\"_blank\" rel=\"noopener noreferrer\">recent study<\/a> by the English Forensic Association.<\/p>\n<p><strong>Criminal behaviour of unsatisfied employees, often engaged by the competition<\/strong>, exposes the employer to very serious financial consequences, such as:<\/p>\n<ul>\n<li><strong>the violation of the legislation and rules on business data protection,<\/strong><\/li>\n<li><strong>the damage to the computer system,<\/strong><\/li>\n<li><strong>the transmission of passwords and other confidential business data, corporate copyright to our\/the competition.<\/strong><\/li>\n<\/ul>\n<figure id=\"attachment_1697\" aria-describedby=\"caption-attachment-1697\" style=\"width: 1270px\" class=\"wp-caption alignleft\"><img alt=\"Two people stand at a podium on stage at Hacktivity, discussing cyber risk. A screen behind them displays the word &quot;PEOPLE&quot; with graphics, while the audience listens from the darkened auditorium.\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-1697 size-full\" src=\"https:\/\/nicolacolucci.com\/wp-content\/uploads\/IMG_20171021_093927405-2.jpg\" alt=\"\" width=\"1280\" height=\"720\" \/><figcaption id=\"caption-attachment-1697\" class=\"wp-caption-text\">Hactivity Forum 2017, Budapest, Hungary.<\/figcaption><\/figure>\n<h2>In case of computer fraud, what are the most important questions we have to ask ourselves?<\/h2>\n<p><strong>1.New European Obligations on Privacy Protection<\/strong>. In case of a theft, <span style=\"color: #000000;\">is my client&#8217;s data sufficiently protected?<\/span> <span style=\"color: #800000;\">Do we know that from May 2018, in case of a breach of our IT system, we may be subjected to pricey sanctions for incorrect and improper data conservation and protection?<\/span><\/p>\n<p><strong>2.HR and unfaithful employee.<\/strong> <span style=\"color: #800000;\">What happens if our employees steal confidential business data?<\/span> Do our employees and managers know how to detect threats from the web? Are computers and mobile devices sufficiently protected from these attacks?<\/p>\n<p><strong>3.Intellectual Property and Competition<\/strong>. <span style=\"color: #800000;\">What if patents and sensitive information about my company&#8217;s intellectual property fall into the wrong hands?<\/span> What about the lists of our partners and the contractual agreements in place with suppliers? Is this information safe enough from web-based attacks?<\/p>\n<p><strong>4.Manufacturing Sector<\/strong>. Are we aware of the latest cyber attacks that have already affected the companies operating in our sector?<\/p>\n<p><strong>5.Business interruption.<\/strong> In case of a prolonged interruption of our IT systems, is my staff adequately prepared <span style=\"color: #800000;\">to resume to work quickly?<\/span><\/p>\n<p><strong>6.Legal expenses.<\/strong> In case our customer has suffered a damage by a breach of our computer system and takes us to court, how much would a lawyer specialized in this area cost us?<\/p>\n<h2>How can we protect ourselves from a computer attack?<\/h2>\n<p>The tools available today can be prevention, control and also insurance. The topic of prevention and control is a very complex one and deserves a separate discussion.<\/p>\n<p>With regard, however, to the current Cyber \u200b\u200bpolicies available on the European market, the insurance industry is reviewing the limits of coverage, due to the increase in requests of claims.<\/p>\n<h2>What financial risks does Cyber \u200b\u200bInsurance cover?<\/h2>\n<p><strong>1.Introduction.\u00a0<\/strong><\/p>\n<p>Almost 10 years ago, cyber insurance was not taken in considerable account, but now -due to the \u00a0enormous increase of the exchange of millions of data and informations, and due to the development of fast computers\u00a0connections -the situation has rapidly changed.<\/p>\n<p>This change has had both positive and negative impact on cyber security.<\/p>\n<p>On one hand, businesses are increasingly interconnected: they are therefore more vulnerable to threats from the web.<\/p>\n<p>On the other hand, insurance companies and risk managers have a clearer picture of how companies communicate\u00a0with their business partners and consumers and how to customize a proper cyber coverage for our businesses and firms.<\/p>\n<p><strong>2.The main covers of the Cyber Policies.<\/strong><\/p>\n<p>&#8220;Physical&#8221; damage to hardware, resulting from a temporary or partial compromise of the operation of the computer system may be covered, in most cases, by the so called electronic insurance, which is fairly widespread among both manufacturing and consulting companies.<\/p>\n<p>&#8220;Financial&#8221; damages may found coverage under the Cyber Policy, which allows us to be protected from some important cost matters such\u00a0as the examples below:<\/p>\n<ol>\n<li><strong>third party claims (suppliers, customers or partners to whom we are responsible),<\/strong><\/li>\n<li><strong>reputable damage,<\/strong><\/li>\n<li><strong>extortion,<\/strong><\/li>\n<li><strong>sanctions resulting from the failure to observe legal obligations regarding the retention of sensitive data,<\/strong><\/li>\n<li><strong>damages from theft of confidential information (see, for example, intellectual property),<\/strong><\/li>\n<li><strong>loss of turnover,<\/strong><\/li>\n<li><strong>costs of investigation and legal fees,<\/strong><\/li>\n<li><strong>production shutdown and cost recovery of the operation of the IT system.<\/strong><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Computer frauds, viruses, data and identity theft, misuse of credit cards, cyber attacks on our computers: these are some of the major threats that affect businesses all over the world on a daily basis, such as hospitals, multi-utilities, law and &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Cyber risk: the threat is inside our company\" class=\"read-more button\" href=\"https:\/\/nicolacolucci.com\/en\/2017\/11\/07\/cyber-risk-the-threat-may-come-from-our-employees\/#more-1691\" aria-label=\"Read more about Cyber risk: the threat is inside our company\">Read more<\/a><\/p>\n","protected":false},"author":5,"featured_media":1616,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"Cyber risk: la minaccia \u00e8 in azienda. Come mi assicuro?","_seopress_titles_desc":"Against employees mistakes, preventive and control measures, IT experts, cyber insurance are the three strategies that a business should invest in nowadays.","_seopress_robots_index":"","footnotes":""},"categories":[71],"tags":[79],"class_list":["post-1691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-insurance","tag-cyber-risk-en","is-tax-category","has-term-business-insurance","is-tax-post_tag","has-term-cyber-risk-en","is-tax-translation_priority","has-term-optional-en","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/posts\/1691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/comments?post=1691"}],"version-history":[{"count":0,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/posts\/1691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/media\/1616"}],"wp:attachment":[{"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/media?parent=1691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/categories?post=1691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nicolacolucci.com\/en\/wp-json\/wp\/v2\/tags?post=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}