Digitisation optimises processes, makes them faster and cheaper - but also increases the risk of becoming a victim of cybercrime. Cyber insurance from AXA protects your company against the financial losses a cyber attack might cause.
As a rule of thumb, the more digitally networked your business is, the greater your need for cyber insurance will be. Even businesses that don’t need computers or IT infrastructure for their main activity often rely on digital services – be it for online banking, Internet telephony, managing appointments or using social media for marketing. Any of these are at risk from cyber attacks.
The security of any IT system depends entirely on the know-how of its users, so the biggest weaknesses can be found where this is at its poorest. The best way to protect against hackers and other online threats, even now, is thus to raise users’ awareness and provide them with training – for example through AXA’s prevention service.
Yes, all PCs and servers must have an anti-virus program, as malicious software can also get onto a computer via USB sticks and other tools.
Whenever the producer publishes one. Because good protection is only guaranteed if the software is kept up to date.
It can be the result of visiting a website which can unknowingly lead to problems: Without deliberately clicking on a link or a download, malware can independently install itself on your computer as in a drive-by. To prevent falling victim to this type of malicious attack, you should set the firewall to automatically block unsafe websites. You should also never surf with an outdated browser.
Social engineers exploit human psychology by attempting to build up relationships with a company’s employees with a view to stealing its data or gaining access to its IT systems. Examples of the techniques they use include fake phone calls in which they pretend to be technicians and contacting employees via social media. Another technique, known as the USB drop, plays on people’s curiosity by strategically placing a “lost” USB stick infected with malware in the hope that an employee will connect it to a company PC.
A firewall is a protection system that protects a PC, server or whole IT system against unauthorized access. A firewall either lets data through or blocks it in line with its own specific rules.
Hackers use e-mails with fake sender information to trick staff into visiting highly convincing fake websites so that they can install malware on the company system or steal login details. The quality of phishing e-mails has increased dramatically. They used to be full of spelling mistakes and bad grammar and use the wrong form of address, but it’s much harder these days to tell them apart from legitimate e-mails in terms of the way they look and their content. You can learn more about phishing here.
We use cookies and analysis tools to improve your user experience, to personalize advertising by AXA and our advertising partner companies, and to provide social media functions. Unfortunately you cannot change your cookie settings via our Cookie Preference Center if you use Internet Explorer 11. If you would like to change your settings, please use an up-to-date browser. By using our website with this browser, you consent to the use of cookies.