<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Insurance | Reason Global</title>
	<atom:link href="https://www.reason-global.com/tag/cyber-insurance/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.reason-global.com</link>
	<description>Reason Global</description>
	<lastBuildDate>Wed, 02 Oct 2024 14:37:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Understanding Emerging Cyber Threats</title>
		<link>https://www.reason-global.com/understanding-cyber-threats/</link>
		
		<dc:creator><![CDATA[Angie McFarlane]]></dc:creator>
		<pubDate>Wed, 04 Oct 2023 11:28:39 +0000</pubDate>
				<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cyber Insurance]]></category>
		<category><![CDATA[Cyber Liability Cover]]></category>
		<guid isPermaLink="false">https://www.reason-global.com/?p=3582</guid>

					<description><![CDATA[<p>We shed light on the emerging cyber threats for 2023-24 and how to limit your exposure.</p>
The post <a href="https://www.reason-global.com/understanding-cyber-threats/">Understanding Emerging Cyber Threats</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><strong>We understand the importance of safeguarding your moving and storage business at Reason Global. So, as we step into Cyber-security Awareness Month, we shed light on some of the most prevalent cyber threats and how to limit your exposure to them.</strong></p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4>Ransomware-as-a-Service (RaaS)</h4>
<p><a title="Understanding Ransomware as a Risk" href="https://www.reason-global.com/understanding-ransomware-as-a-risk/">Ransomware attacks</a> are increasing, and criminals are making it easier for others to carry out these attacks through RaaS platforms. Ransomware attacks involve encrypting a victim&#8217;s data and demanding a ransom for release. RaaS makes this nefarious tactic more accessible to cybercriminals, allowing them to rent ransomware tools and reducing the technical skill required. To safeguard your business, regularly back up data, update security protocols, and consider cyber insurance to mitigate the financial impact.</p>
<h4>AI-Powered Attacks</h4>
<p>Cybercriminals are increasingly using artificial intelligence to enhance their attacks, for example, by employing machine learning algorithms to craft highly convincing <a title="4 Tips to Bolster Your Business Against Phishing Attacks" href="https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/">phishing emails</a>, making it harder for users to discern legitimate from malicious messages. Educate employees on how to recognise AI phishing emails and consider employing AI-powered email security solutions to help detect and stop cyberattacks before they reach users&#8217; mailboxes.</p>
<h4>Supply Chain Attacks</h4>
<p>Third-party suppliers can be vulnerable points of entry for <a title="Why Cyber Criminals are Targeting You!" href="https://www.reason-global.com/articles/why-cyber-criminals-are-targeting-you/">cybercriminals</a>, who can target a target organisation&#8217;s suppliers and service providers to gain access to their systems. For instance, the SolarWinds breach of 2020 compromised a widely used software provider, allowing attackers to infiltrate numerous high-profile organisations. Protect your business by vetting your suppliers&#8217; security practices and implementing strict supply chain security measures.</p>
<h4>Deepfakes and Disinformation</h4>
<p>Deepfakes use AI to manipulate audio and video content to deceive viewers. The spread of fake videos and disinformation can harm your business&#8217;s reputation. Train your employees to recognise deepfake content and encourage them to stay vigilant.</p>
<h4>Cloud Jacking</h4>
<p>With businesses relying more on cloud services, securing your cloud infrastructure is crucial. Cybercriminals exploit vulnerabilities in cloud infrastructure to steal sensitive data or disrupt services. The Capital One breach in 2019 exposed over 100 million customer records due to a misconfigured firewall in an Amazon Web Services (AWS) server. Protect your business by utilising robust authentication methods and encryption for cloud data.</p>
<h4>Insider Threats</h4>
<p>These come from employees, contractors, or business partners accessing your systems. This happened in 2019 when a former Twitter employee exploited their privileged access to deactivate high-profile individuals&#8217; accounts temporarily. You can implement access controls and employee training to minimise insider threats.</p>
<p>The moving and storage industry is not immune to this evolving cyber threat landscape. Fortunately, Cyber Liability insurance policies can provide different types of extensions to protect your business from cyber-attacks. Learn more about our <a title="Cyber Liability Insurance" href="https://www.reason-global.com/cyber-liability-insurance/">Cyber Liability Insurance Cover</a>.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container  vc_custom_1528969104909">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element  vc_custom_1696418197303">
		<div class="wpb_wrapper">
			<h3 style="text-align: center;">Safeguard your business from cyber threats</h3>
<p style="text-align: center;">We have access to a number of different insurance companies to ensure you have the proper cover to protect your company against losses from cyber-attacks. For more advice,<a href="https://www.reason-global.com/contact/">please contact us today</a>.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>
</div>The post <a href="https://www.reason-global.com/understanding-cyber-threats/">Understanding Emerging Cyber Threats</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>4 Tips to Bolster Your Business Against Phishing Attacks</title>
		<link>https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/</link>
					<comments>https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Angie McFarlane]]></dc:creator>
		<pubDate>Thu, 27 Feb 2020 10:49:26 +0000</pubDate>
				<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Moving]]></category>
		<category><![CDATA[Self Storage]]></category>
		<category><![CDATA[Cyber Insurance]]></category>
		<guid isPermaLink="false">https://www.reason-global.com/?p=2305</guid>

					<description><![CDATA[<p>Here are our four top tips on how to bolster your business against phishing attacks.</p>
The post <a href="https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/">4 Tips to Bolster Your Business Against Phishing Attacks</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Among the various forms of cyber-attack, phishing &#8211; a scamming method that tricks users into clicking on an unsafe link or giving away sensitive information that hackers can use to access important accounts or compromise data &#8211; repeatedly reigns as a top technique</p>
<p>Recent research revealed that 45 per cent of UK organisations have experienced a phishing attack in the past two years. This common scare can wreak financial and reputational havoc on any company, regardless of size or industry and expose not just your data, but data relating to your customers. With this in mind, it’s vital for any moving and self-storage businesses to have robust cyber-security measures in place to help prevent phishing attacks.<span class="Apple-converted-space"> </span></p>
<p>Here are our four top tips on how to bolster your business against phishing attacks:</p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong>1. Promote staff awareness</strong></h4>
<p>The majority of cyber-attacks require human interaction to be successful. This highlights that although an organisation’s employees can be its biggest asset, they also have the potential to be its biggest risk. Utilise an effective training programme to that teaches your employees how to recognise and report phishing attacks. <a href="https://www.reason-global.com/wp-content/uploads/2020/02/Infographic_Most-Common-Phishing-Techniques.pdf" target="_blank" rel="noopener noreferrer">Download our infographic guide here ››</a></p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong>2. Implement proper protection software</strong></h4>
<p>Install anti virus and malware protection on all organisational devices and conduct routine software updates.</p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong>3. Filter company emails</strong></h4>
<p>Ensure your company’s email server has security features in place to filter emails from potentially malicious senders into the spam folder.</p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong>4. Establish a cyber-incident response plan</strong></h4>
<p>Ensuring your organisation has a robust cyber-incident continuity and response plan will help to limit the damages of a phishing attack. Review and test this plan regularly with your employees. <a href="https://www.reason-global.com/cyber-continuity-and-incident-response-plan-toolkit/">Download our Cyber Continuity and Incident Response Plan Toolkit ››</a></p>
<p>Watch our short video for guidance on how to prevent phishing attacks in the workplace&#8230;</p>

		</div> 
	</div> 
	<div class="wpb_video_widget wpb_content_element">
		<div class="wpb_wrapper"><div class="wpb_video_wrapper"><iframe src="https://player.vimeo.com/video/394144783?h=4b52f86d72&amp;dnt=1&amp;app_id=122963" width="500" height="281" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></div>
		</div> 
	</div> <div class="vc_row wpb_row vc_inner vc_row-fluid vc_custom_1555345949065 vc_row-has-fill"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner vc_custom_1555345826525"><div class="wpb_wrapper">
	<div class="wpb_single_image wpb_content_element vc_custom_1555346342875 vc_align_left">
		<div class="wpb_wrapper">
			
			<div class="vc_single_image-wrapper  "><img fetchpriority="high" decoding="async" width="750" height="540" src="https://www.reason-global.com/wp-content/uploads/2019/01/RGI-Cyber-PDF-01-750x540.jpg" class="vc_single_image-img attachment-full" alt="" title="RGI-Cyber-PDF-01-750x540" srcset="https://www.reason-global.com/wp-content/uploads/2019/01/RGI-Cyber-PDF-01-750x540.jpg 750w, https://www.reason-global.com/wp-content/uploads/2019/01/RGI-Cyber-PDF-01-750x540-300x216.jpg 300w" sizes="(max-width: 750px) 100vw, 750px" /></div>
		</div> 
	</div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner vc_custom_1555345897493"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong><span style="color: #d31245;">Cyber-continuity &amp; Incident Response Plan Toolkit</span></strong></h4>
<p>Learn how to create a response plan to help you meet the demands of data protection laws (GDPR) and ensure overall business continuity.</p>

		</div> 
	</div> <div class="vc_btn3-container vc_btn3-center vc_do_btn" ><a style="background-color:#d31245; color:#ffffff;" class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-square vc_btn3-style-custom" href="https://www.reason-global.com/wp-content/uploads/2019/04/Cyber-Continuity-and-Incident-Response-Plan-Toolkit-1.pdf" title="">DOWNLOAD TOOLKIT ››</a></div></div></div></div></div>
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>As cyber-attack trends and techniques continue to evolve, so should your <a href="https://www.reason-global.com/cyber-liability-insurance/">cyber-insurance policy</a>. Purchasing cyber-cover is the only way to ensure the ultimate protection against a costly data breach.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container  vc_custom_1528969104909">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element  vc_custom_1582798147373">
		<div class="wpb_wrapper">
			<h3 style="text-align: center;">CONTACT US</h3>
<p style="text-align: center;">For more information about our cyber-insurance solutions, <a href="https://www.reason-global.com/contact/">contact Reason Global today</a>.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>
</div>The post <a href="https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/">4 Tips to Bolster Your Business Against Phishing Attacks</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.reason-global.com/4-tips-to-bolster-your-business-against-phishing-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Guide to Cyber Insurance and Email Fraud</title>
		<link>https://www.reason-global.com/a-guide-to-cyber-insurance-and-email-fraud/</link>
					<comments>https://www.reason-global.com/a-guide-to-cyber-insurance-and-email-fraud/#respond</comments>
		
		<dc:creator><![CDATA[Angie McFarlane]]></dc:creator>
		<pubDate>Tue, 23 Jul 2019 08:34:01 +0000</pubDate>
				<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Cyber Insurance]]></category>
		<guid isPermaLink="false">https://www.reason-global.com/?p=2211</guid>

					<description><![CDATA[<p>By understanding the risks involved with the CEO email scam, you can boost your defences to better protect your company from cyber-criminals...</p>
The post <a href="https://www.reason-global.com/a-guide-to-cyber-insurance-and-email-fraud/">A Guide to Cyber Insurance and Email Fraud</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>In recent years, cyber fraud has emerged as one of the most significant threats facing organisations of all sizes. Cyber attacks (such as data breaches and hacks) result in devastating damage to small and medium sized businesses, such as business disruptions, revenue loss, legal fees, reputation damage, and more. Although the average business loss is £35,000, it can vary widely with some UK companies reporting losses of up to £18.5million according to the nation’s fraud and cyber-crime reporting centre, Action Fraud.</p>
<p>As a result Cyber liability insurance has fast become an essential component to every businesses risk management programme. However, due to the considerable variation between cyber policy wordings, several misconceptions have arisen on what a cyber insurance policy does and doesn’t cover.</p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4>Does Cyber Insurance Cover CEO Fraud Email Scams?</h4>
<p>One of the most common areas of confusion is around phishing scams that trick people into taking action or divulging sensitive or confidential information. A variety of cyber-attacks are considered to be phishing scams, but the CEO fraud email scam (also known as ‘bogus boss’, ‘whale phishing’, ‘insider spoofing’, company exec spam and business email compromise) can be the most expensive and problematic.</p>
<p>This is because cyber liability insurance coverage will address the first and third-party risks associated with e-business, the Internet, networks and informational assets &#8211; protecting your business against exposures arising out of online breaches and cybercrime. But phishing attacks &#8211; which involve a large element of human error &#8211; have the potential to trigger different insurance policies, not just Cyber Policies.</p>
<p>By understanding the risks involved with the CEO email scam, you can boost your defences to better protect your company from cyber-criminals&#8230;</p>

		</div> 
	</div> 
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4>CEO Fraud Case Study</h4>
<p>The following case study based on a real-life medium-sized company that fell victim to a CEO fraud scam illustrates the insidious and subtle nature of the crimes.</p>
<p>An accountant at the company received a phone call from an unknown source, who told the accountant that she should expect to receive an email from the CEO with explicit instructions to conduct a financial transaction. The accountant then received an email that appeared to be from the CEO that explained the company was purchasing a business in Cyprus and that the accountant was to expect a phone call from a consultant, who would explain where to transfer the money.</p>
<p>The accountant received several more emails and phone calls, all of which demanded that she act quickly to ensure that the deal did not fall through. Due to the fraudster’s repeated urgings, the accountant authorised £372,000 to be transferred to the fraudster’s account. While the company’s bank held up three of the approved wire transfers, one worth nearly £100,000 was still approved. This all happened within three hours, which is typical of a CEO fraud email scam. Fraudsters will try to pressure employees to act quickly without hesitation.</p>
<p>In this situation, the financial loss from the fraud would be excluded from the company’s primary coverage provided in its cyber policies because there was no loss of tangible business assets such as the loss of customer data involved.<br />
The fact that a fraud was carried out by email does not in itself make the financial loss a cyber-incident. In these circumstances, the Insured is a victim of crime in the same way it would be if the Insured is persuaded to transfer money as the result of a fraudulent telephone call, meeting or letter. Rather, this incident would be viewed as a crime as an accountant was persuaded to transfer the money via a fraudulent phone call and email.</p>
<p>If the policy included fraudulent instruction that covered against losses resulting from any payments made to someone impersonating a client, vendor or employee that is intended to mislead then the company would be protected from CEO email fraud. Likewise if the fraudster had sent the email from a genuine internal account then the security of the company network could have been compromised and then company would have had a case.</p>

		</div> 
	</div> <div class="vc_row wpb_row vc_inner vc_row-fluid vc_custom_1555345949065 vc_row-has-fill"><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner vc_custom_1555345826525"><div class="wpb_wrapper">
	<div class="wpb_single_image wpb_content_element vc_custom_1563806075267 vc_align_left">
		<div class="wpb_wrapper">
			
			<div class="vc_single_image-wrapper  "><img decoding="async" width="750" height="540" src="https://www.reason-global.com/wp-content/uploads/2019/07/Phishing-protect-Pod-750x540.jpg" class="vc_single_image-img attachment-full" alt="" title="Phishing-protect-Pod-750x540" srcset="https://www.reason-global.com/wp-content/uploads/2019/07/Phishing-protect-Pod-750x540.jpg 750w, https://www.reason-global.com/wp-content/uploads/2019/07/Phishing-protect-Pod-750x540-300x216.jpg 300w" sizes="(max-width: 750px) 100vw, 750px" /></div>
		</div> 
	</div> </div></div></div><div class="wpb_column vc_column_container vc_col-sm-6"><div class="vc_column-inner vc_custom_1555345897493"><div class="wpb_wrapper">
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<h4><strong><span style="color: #d31245;">Protect Your Business from Email Fraud</span></strong></h4>
<p>Our guide defines the common email scams and how, with the proper precautions, your company can adequately defend against cyber-attacks.</p>

		</div> 
	</div> <div class="vc_btn3-container vc_btn3-center vc_do_btn" ><a style="background-color:#d31245; color:#ffffff;" class="vc_general vc_btn3 vc_btn3-size-md vc_btn3-shape-square vc_btn3-style-custom" href="https://www.reason-global.com/wp-content/uploads/2019/07/Cyber-Risks-Liability-Combatting-Bogus-Boss-Email-Scams.pdf" title="" target="_blank">DOWNLOAD GUIDE ››</a></div></div></div></div></div>
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container  vc_custom_1528969104909">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element  vc_custom_1563800324268">
		<div class="wpb_wrapper">
			<h3 style="text-align: center;">CONTACT US</h3>
<p style="text-align: center;"><a href="https://www.reason-global.com/contact/">Contact your Reason Global Insurance representative </a> for more information on the importance of securing robust cyber-cover and managing your cyber-risk.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>
</div>The post <a href="https://www.reason-global.com/a-guide-to-cyber-insurance-and-email-fraud/">A Guide to Cyber Insurance and Email Fraud</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.reason-global.com/a-guide-to-cyber-insurance-and-email-fraud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Maersk Cyber Attack &#038; The Impact On The Moving Industry</title>
		<link>https://www.reason-global.com/maersk-cyber-attack-a-warning-to-the-moving-industry/</link>
					<comments>https://www.reason-global.com/maersk-cyber-attack-a-warning-to-the-moving-industry/#respond</comments>
		
		<dc:creator><![CDATA[Angie McFarlane]]></dc:creator>
		<pubDate>Mon, 03 Jul 2017 11:36:51 +0000</pubDate>
				<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Marine]]></category>
		<category><![CDATA[Relocation]]></category>
		<category><![CDATA[Cyber Insurance]]></category>
		<guid isPermaLink="false">https://www.reason-global.com/?p=1587</guid>

					<description><![CDATA[<p>Update on the damaging IT cyber attack on global shipping giants A.P. Miller-Maersk.</p>
The post <a href="https://www.reason-global.com/maersk-cyber-attack-a-warning-to-the-moving-industry/">Maersk Cyber Attack & The Impact On The Moving Industry</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></description>
										<content:encoded><![CDATA[<div class="wpb-content-wrapper"><div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>The moving and shipping industry suffered from its most damaging IT cyber attack in recent history when global shipping giant A.P. Miller-Maersk was targeted last week.</p>
<p>In the second major ransomware attack of this year, the new Petya ransomware virus started to affect companies across Europe early on Tuesday 27th June, before spreading to the US and South America. Maersk were forced to shut down their website and large parts of their global operations to halt the spread of the virus, with major ports including the Port of New York and New Jersey on the US East Coast and Rotterdam, Europe’s largest harbour, temporarily closed when the virus affected multiple AP terminals.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>With a fleet of over 600 container vessels, Maersk handles over a quarter of all containers shipped on the busy Asia-Europe route and inevitably the attack had a huge knock on effect across the moving and shipping industries, affecting shipment booking and communications between companies. Following an official statement by Maersk on Wednesday confirming &#8220;IT and communications infrastructure have been impacted and we have proactively shut down as a security measure,” the group took to their website and social media channels to keep customers updated.</p>

		</div> 
	</div> 
	<div class="wpb_raw_code wpb_content_element wpb_raw_html">
		<div class="wpb_wrapper">
			<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">Cyber attack update 09:06 CEST <a href="https://t.co/kInQZz4Wyv">pic.twitter.com/kInQZz4Wyv</a></p>&mdash; Maersk (@Maersk) <a href="https://twitter.com/Maersk/status/879966081611431936">June 28, 2017</a></blockquote> <script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Terminals in the UK were not directly affected by the attack, but without access to Maersk systems, many moving firms were unable to issue quotes or accept new bookings. Leading moving company Pickfords also issued a statement on their website and social media channels to keep their customers informed of the situation.</p>

		</div> 
	</div> 
	<div class="wpb_raw_code wpb_content_element wpb_raw_html">
		<div class="wpb_wrapper">
			<blockquote class="twitter-tweet" data-lang="en"><p lang="en" dir="ltr">The article below has now been updated with the services still available from <a href="https://twitter.com/MaerskLine">@MaerskLine</a>. Please contact Pickfords if you have any concerns <a href="https://t.co/s8b2qaOcM3">https://t.co/s8b2qaOcM3</a></p>&mdash; Pickfords (@Pickfords) <a href="https://twitter.com/Pickfords/status/880023517172989952">June 28, 2017</a></blockquote> <script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script>
		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>By the end of the week, Maersk was ‘progressing towards technical recovery’ with online bookings, cargo loading and cargo in transit all operating normally. Nevertheless, this recent attack highlights yet again how Cyber security is among the most pressing issues facing our business today and that no organisation is immune to the threat.</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>	<div class="vc_row wpb_row vc_row-fluid vc_custom_1494593229634"  >
	<div class="vc_col-sm-12 wpb_column vc_column_container ">
		<div class="wpb_wrapper">
			
	<div class="wpb_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Dan Reynolds, Director at Reason Global said, “We are talking to our clients wherever we feel appropriate regarding the growing threat of Cyber and the potential exposures. It is a growing concern for many industries but can still be seen as something that doesn’t really affect ours. However, this latest incident shows how issues in supply chains can cause strong knock-on effects to our own clients and their customers in turn. Unfortunately, the threat continues to grow as seen in the news far too often recently. It is now a reality that Cyber exposure needs to form part of a company’s overall risk management programme.”</p>

		</div> 
	</div> 
		</div> 
	</div> 
</div><div class="vc_row-full-width"></div>
</div>The post <a href="https://www.reason-global.com/maersk-cyber-attack-a-warning-to-the-moving-industry/">Maersk Cyber Attack & The Impact On The Moving Industry</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.reason-global.com/maersk-cyber-attack-a-warning-to-the-moving-industry/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Insurance in the news&#8230; again!</title>
		<link>https://www.reason-global.com/cyber-insurance-in-the-news-again/</link>
		
		<dc:creator><![CDATA[Angie McFarlane]]></dc:creator>
		<pubDate>Wed, 15 Jun 2016 13:50:13 +0000</pubDate>
				<category><![CDATA[Cyber Risk]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Cyber Insurance]]></category>
		<guid isPermaLink="false">https://www.reason-global.com/?p=1137</guid>

					<description><![CDATA[<p>The cyber insurance industry is moving fast, but not quickly enough to keep up with the needs of businesses according to a recent survey.</p>
The post <a href="https://www.reason-global.com/cyber-insurance-in-the-news-again/">Cyber Insurance in the news… again!</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></description>
										<content:encoded><![CDATA[<p>The cyber insurance industry is moving fast, but not quickly enough to keep up with the needs of businesses according to a recent survey.</p>
<p>In the <a href="http://www.insurancebusinessmag.com/uk/news/breaking-news/businesses-unsure-if-cyber-insurance-covers-this-emerging-threat-32983.aspx">survey carried out by the leading email and data security company Mimecast</a>, 45% of businesses with cyber insurance said that they were unsure if their policies were up-to-date for covering new social engineering email attacks, and only 10% firms are confident that their cyber insurance policies are completely current and advanced.</p>
<p>“Cyber insurance uptake is growing quickly but a lack of employee training on the latest email attacks is leaving organizations at great risk of breaking policy terms,” said Steven Malone, Mimecast director of security product management.“Attacks where employees are tricked into sending personal data or intellectual property are even less likely to be fully covered.”</p>
<p>The survey&#8217;s findings echo <a href="http://www.insurancebusinessmag.com/uk/news/breaking-news/ceo-says-compulsory-cyber-insurance-is-impossible-to-implement-32859.aspx">comments made by CEO of Airmic</a> John Hurrell at the association&#8217;s recent conference. Hurrell highlighted the responsibility of cyber insurers to keep up with the needs of businesses as they become increasingly exposed to risks such as data breaches and business interruptions.</p>
<p>You can read both articles via the links below:</p>
<p><a href="http://www.insurancebusinessmag.com/uk/news/breaking-news/businesses-unsure-if-cyber-insurance-covers-this-emerging-threat-32983.aspx">Businesses unsure if cyber insurances covers this emerging threat ››</a></p>
<p><a href="http://www.insurancebusinessmag.com/uk/news/breaking-news/ceo-says-compulsory-cyber-insurance-is-impossible-to-implement-32859.aspx">CEO says compulsory cyber insurances is impossible to implement ››</a></p>
<p>&nbsp;</p>
<p>If you have any doubts or concerns about your cyber policy and cover needed, please <a href="https://www.reason-global.com/contact/">give us a call</a> and we’ll be happy to advise.</p>The post <a href="https://www.reason-global.com/cyber-insurance-in-the-news-again/">Cyber Insurance in the news… again!</a> first appeared on <a href="https://www.reason-global.com">Reason Global</a>.]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
