Protect your personal information

1 October 2020 Products & Solutions

In a recent report by Deloitte, it was stated that “cyber-attacks in the insurance sector are growing exponentially as insurance companies migrate toward digital channels in an effort to create tighter customer relationships, offer new products and expand their share of customers’ financial portfolios.”

“The insurance industry has become an enticing target for cybercrime. With its huge store of personally identifiable information (PII) about policyholders, it is estimated that data breaches at insurance companies over the last few years have exposed the personal information of over 100 million people,” says Simon Campbell-Young, CEO at MyCyberCare.

So how do cyber criminals attack insurance companies? “Firstly, they use various types of malware, such as ransomware. Ransomware blocks a company’s access to its systems and data until a ransom is paid. Trojan horse malware such as Emotet and Trickbot, which were originally designed to break into banking systems, are also becoming a growing threat to insurance companies,” Campbell-Young points out.

Phishing attacks are also often used to gain unauthorised access to an insurance company’s information. Another, less obvious way, is the inadvertent disclosure of sensitive information by insurance companies.

“All of these factors can be off-putting to individuals or businesses who are required to liaise with their insurers via a digital platform. While insurance companies should be held accountable for ensuring the security of their own platform, it is wise for you to protect yourself as well as your family and business with appropriate cybersecurity software,” says Campbell-Young.

MyCyberCare has compiled a number of cybersecurity packages that are suited to individual budgetary and risk-aversion profiles. These packages provide:

• Protection against cybercrime.

• Detection of malicious threat actors.

• Monitoring of the Dark Web for fraudulent usage of your personal, family or business digital assets.

• Cyber bullying prevention in terms of IT, legal and psychological assistance.

• Cover against online loss of funds.

“Although the risks and priorities may vary from one individual or business to another, there is a common denominator in cybersecurity – you need to acknowledge your current vulnerability and then gain control over how you adopt the software necessary to mitigate this risk,” says Campbell-Young.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Bringing fire safety closer to home
SafeQuip Fire & Safety Products & Solutions Smart Home Automation
SafeQuip’s latest product launch introduces two compact, disposable fire extinguishers for everyday use, one suitable for Class A, B, and C fires, the other rated for Class A, B and F fires.

Read more...
The role of safe storage in mitigating burglary and fire risk
Gunnebo Safe Storage Africa Products & Solutions Fire & Safety Smart Home Automation
Household burglary and fire remain amongst the most common threats to household assets in South Africa. Statistics South Africa’s 2024 Victims of Crime Survey reported approximately 1,5 million incidents of housebreaking in a single year.

Read more...
South African counter-drone system completes trials
Products & Solutions Perimeter Security, Alarms & Intruder Detection IoT & Automation
Pretoria-based military engineering company Centauri Technologies has announced that its TriAD counter-drone system successfully completed integrated, multi-layered C-UAS (counter-unmanned aerial system) capability trials in a vehicle-mounted configuration.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Inside the RealScan SG10
neaMetrics Access Control & Identity Management Products & Solutions
The SG10 was optimised for speed at every stage, from capture to processing. The result is faster fingerprint acquisition and near-instant response for operators.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.