Top Risks for Businesses 2023

business disruption

Originally published by Allianz. The Allianz Risk Barometer is an annual report identifying the top corporate risks for the year ahead. It’s based on the insight of over 2,700 risk management experts from 94 countries and territories. Here we look at the top five risks identified by UK participants. 1. Cyber Incidents (#1 in 2022) […]

Cyber-Incidents: The Biggest Risk in 2023

cyber-incidents

Cyber-incidents topped the list of risks facing businesses around the world in 2023 for the second year in a row, according to Allianz’s 2023 Risk Barometer. In addition to ranking as the number one risk globally, cyber-events like IT outages, ransomware attacks and data breaches captured the top spot in 19 different countries, including the […]

Cyber-Risks and Liabilities Sept/Oct 2022

The Benefits of Threat Intelligence  Threat Intelligence (TI) refers to data that is collected, processed, and analysed to understand a threat actor’s motives, targets, and attack behaviours. Through TI, organisations can analyse both previous cyber-attacks and potential future threats.   Rather than being reactive, TI allows organisations to adopt a proactive approach to cyber-security. This […]

Commercial Insurance Profile – June 2022

Key Figures From the 2022 Cyber Security Breaches Survey Every year, the Department for Digital, Culture, Media & Sport commissions a nationwide survey as part of the National Cyber Security Programme. This Cyber Security Breaches Survey provides valuable insight into the cyber-security and data breach patterns of UK employers. As remote work remains prevalent and […]

Cyber-Risks and Liabilities: Spotting Phising Attacks

Spotting and Reporting Phising Attacks A phishing incident is a type of social engineering attack that involves a cyber-criminal using scam emails, text messages or phone calls to deceive a victim. Phishing attacks exploit people, aiming to trick individuals into doing the wrong thing, such as clicking a suspicious link that downloads malware or steals […]

Retail Risk Insights – Protect Your Online Retail Network

Online retailers have been experiencing huge growth in recent years, making them increasingly attractive targets for major cyber-attacks. Understanding cyber-security risks and protecting your network is crucial to keeping your online company in business.   Hackers and Hacktivists  Do you think hackers only target big brand retail websites? Think again. Hackers have begun to realise […]

Cyber Security Fundamentals

Cyber-security breaches continue to be a problem for all types of organisations. According to a survey by the Department for Digital, Culture, Media & Sport, 40% businesses and 25% of charities reported experiencing cyber-attacks in the past 12 months.  While organisations are always at risk from a cyber-attack, there may be a heightened risk at […]

Cyber Risks and Liabilities

A Rising Threat – Malvertising Malvertising—or malicious advertising—is a relatively new cyber-attack technique. The term comes from a combination of ‘malware’ and ‘advertising’. Cyber-criminals embed malware into the advertisements (ads) of well-known online publications. Trusting these legitimate sites, internet users load the webpage or click on the ad, allowing malware to be downloaded onto their […]

Cyber Risks – Penetration Testing Explained

Penetration Testing Explained Keeping workplace technology up and running is vital to any organisation’s success. While this task seems feasible, it’s growing harder and harder each year as cyber-criminals expand their reach. It’s not enough to simply protect workplace technology with software and security protocols – it’s also critical for your organisation to test the […]

The Importance of Two-Factor Authentication

Cyber-security is an integral part of risk management for any organisation. Cyber-criminals are capable of executing devastating attacks that can result in financial losses, reputational damage and government fines. With those potential consequences in mind, employers should be mindful and take any precautions that might be able to protect them, such as using two-factor authentication. […]