Protect your personal information

1 October 2020 Products & Solutions

In a recent report by Deloitte, it was stated that “cyber-attacks in the insurance sector are growing exponentially as insurance companies migrate toward digital channels in an effort to create tighter customer relationships, offer new products and expand their share of customers’ financial portfolios.”

“The insurance industry has become an enticing target for cybercrime. With its huge store of personally identifiable information (PII) about policyholders, it is estimated that data breaches at insurance companies over the last few years have exposed the personal information of over 100 million people,” says Simon Campbell-Young, CEO at MyCyberCare.

So how do cyber criminals attack insurance companies? “Firstly, they use various types of malware, such as ransomware. Ransomware blocks a company’s access to its systems and data until a ransom is paid. Trojan horse malware such as Emotet and Trickbot, which were originally designed to break into banking systems, are also becoming a growing threat to insurance companies,” Campbell-Young points out.

Phishing attacks are also often used to gain unauthorised access to an insurance company’s information. Another, less obvious way, is the inadvertent disclosure of sensitive information by insurance companies.

“All of these factors can be off-putting to individuals or businesses who are required to liaise with their insurers via a digital platform. While insurance companies should be held accountable for ensuring the security of their own platform, it is wise for you to protect yourself as well as your family and business with appropriate cybersecurity software,” says Campbell-Young.

MyCyberCare has compiled a number of cybersecurity packages that are suited to individual budgetary and risk-aversion profiles. These packages provide:

• Protection against cybercrime.

• Detection of malicious threat actors.

• Monitoring of the Dark Web for fraudulent usage of your personal, family or business digital assets.

• Cyber bullying prevention in terms of IT, legal and psychological assistance.

• Cover against online loss of funds.

“Although the risks and priorities may vary from one individual or business to another, there is a common denominator in cybersecurity – you need to acknowledge your current vulnerability and then gain control over how you adopt the software necessary to mitigate this risk,” says Campbell-Young.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Recording 40 high-resolution channels
Dallmeier Electronic Southern Africa Surveillance Products & Solutions
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
New Edge AI Plus PTZ cameras with analytics
Products & Solutions Surveillance
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Putting security in gear
Asset Management Products & Solutions
The inaugural Securex Cape Town 2025 will showcase a number of companies focused on vehicle and fleet security on South Africa’s dangerous and often crime-infested roads.

Read more...
Managing assets and clear communication
Asset Management Products & Solutions
Communication is essential for security management as well as efficient asset control. A few companies at Securex Cape Town 2025 might have the solution you are looking for.

Read more...
Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
See crime stopped in seconds
Products & Solutions Security Services & Risk Management
Fog Bandit, a leader in security fog, is bringing its instant crime-stopping technology to Securex Cape Town 2025. Experience the innovation trusted worldwide to protect retailers, warehouses, and high-value sites.

Read more...
Electrical fire safety in lithium-ion battery rooms
Fire & Safety Residential Estate (Industry) Products & Solutions
Pratliperl is a non-combustible, ultra-lightweight aggregate that can be mixed with cement and applied as a plaster or screed to walls, floors, and ceilings. When applied at just 30 mm thickness, it delivers a two-hour fire rating.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.