Firms Large and Small Should Shore Up Their CyberSecurity Against Cyberattacks
In light of recent developments with sanctions issued against Russia by the United States, the U.S. is now warning all organizations and businesses, no matter how small or large, to shore up their cybersecurity to prevent them from being a target of possible Russian cyberattacks.
Your Lawyer Professional Liability insurance policy now offers cyber liability coverage to protect you and your firm in the event of a cyberattack. It’s our goal at AIM to provide our policyholders with leading-edge insurance solutions that not only provide state-of-the-art protection but also help reduce risk and keep your business safe. Your new AIM lawyer professional liability policy offers cyber coverage for first-party exposures like ransomware attacks, as well as third-party coverage for claims alleging liability for a data breach.
In addition to the protection provided by cyber liability coverage, it is important that you remind all of your employees to follow the below tips to shore up your firm’s cybersecurity:
1. Passwords & Multi-factor Authentication.
You should always use strong and long passwords that are difficult to hack. Use unique passwords, meaning a different one for each account. Multi-factor authentication adds an extra layer of security.
2. Update Your Anti-Virus Software.
Ensure that your firm’s anti-virus software is up-to-date, and if you do not currently have anti-virus software installed, ask your IT company about their recommendations.
3. Phishing Attempts.
Avoid clicking on links in emails, email attachments, or pop-up ads. Hackers frequently use links and attachments in seemingly reputable-looking emails to gain access to your firm’s servers.
4. Have a Backup to Your Backups.
We have all heard the countless stories of firms that lost information because their backups were not functioning properly. Ask your IT company if there is a backup to your backups. This could be that your servers are backing up to the cloud or other mechanisms.
5. Create and Exercise a Cyber Incident Response Plan, Resilience Plan, and Continuity of Operations Plan.
Create, maintain, and exercise a cyber incident response plan, resilience plan, and continuity of operations plan so that critical functions and operations can be kept running if technology systems are disrupted or need to be taken offline.