read

How to Prevent & Respond to a Cyber Attack

By Axis Marketing

 

christopher-gower-m_HRfLhgABo-unsplash

Unlike physical threats that prompt immediate action—like stopping, dropping and rolling if you catch on fire—cyber threats are often difficult to identify and understand. Cyber threats include dangers such as viruses erasing entire systems, intruders breaking into systems and altering files, intruders using your computer or device to attack others and intruders stealing confidential information.
The spectrum of cyber risks is limitless; threats, some more serious and sophisticated than others, can have wide-ranging effects on the individual, community, organizational and national levels.

Before a Cyber Attack
You can increase your chances of avoiding cyber risks by setting up the proper controls. The following are things you can do to protect yourself, your family and your property before a cyber incident occurs.

  • Only connect to the Internet over secure, password-protected networks.
  • Do not click on links or pop-ups, open attachments or respond to emails from strangers.
  • Always enter a URL by hand instead of following links if you are unsure of the sender.
  • Do not respond to online requests for personally identifiable information (PII); most organizations—banks, universities, companies, etc.—will never ask for your personal information over the Internet.
  • Limit who you are sharing information with by reviewing the privacy settings on your social media accounts.
  • Trust your instincts; if you think an offer is too good to be true, it probably is.
  • Password-protect all devices that connect to the Internet and all user accounts.
  • Do not use the same password twice -- choose a password that means something to you and only you. Change your passwords on a regular basis (every 90 days or so).
  • If you see something suspicious, report it to the proper authorities.

The extent, nature and timing of cyber incidents are impossible to predict. There may or may not be any warning. Some cyber incidents take a long time (weeks, months or years) to be discovered and identified.

During a Cyber Attack
Immediate Actions

  • Check to make sure the software on all of your systems is up to date.
  • Run a scan to make sure your system is not infected or acting suspiciously.
  • If you find a problem, disconnect your device from the Internet and perform a full system restore.

At Home

  • Disconnect your device (computer, gaming system, tablet, etc.) from the Internet. By removing the Internet connection, you prevent an attacker or virus from being able to access your computer and perform tasks such as locating personal data, manipulating or deleting files or using your device to attack others.
  • If you have anti-virus software installed on your computer, update the virus definitions (if possible), and perform a manual scan of your entire system. Install all of the appropriate patches to fix know vulnerabilities.

At Work

  • If you have access to an IT department, contact someone in it immediately. The sooner someone can investigate and clean your computer, the less damage to your computer and other computers on the network.
  • If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.

In a Public Place (Library, School, etc.)

  • Immediately inform the librarian, teacher or manager in charge. If someone has access to an IT department, contact the department immediately.

After a Cyber Attack

  • File a report with the local police so there is an official record of the incident.
  • Report online crime or fraud to your region’s Canadian Security Intelligence Service (CSIS) or the Canadian Anti-Fraud Centre.
  • Report identity theft to the Canadian Trade Commissioner Service.
  • If your PII was compromised, consider other information that may be at risk. Depending what information was stolen, you may need to contact other agencies; for example, if someone has gained access to your Social Insurance number, contact the two national credit bureaus, Equifax and TransUnion. You should also contact your provincial or territorial ministry responsible for transportation if your driver's licence or car registration has been stolen.

In addition to insuring your home, the Axis Insurance Group is committed to helping you and your loved ones stay safe when disaster strikes. If you would like more information on how to protect yourself from a cyber attack, contact us today.

Are you prepared for a major cyber security event? Download our free Cyber Toolkit to learn more about cyber incident response plans and how to create one of your own.

Download Here

 

Tags: Cyber

Let's Talk

At Axis we provide all lines of commercial and personal insurance. We would love to speak with you.