07.10.2015 Views

InView Autumn/Winter 2015

Welcome to the second issue of InView where we focus on the highly topical and hugely important issues surrounding technology, including cyber risks.

Welcome to the second issue of InView where we focus on the highly topical and hugely important issues surrounding technology, including cyber risks.

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Issue 2 | <strong>Autumn</strong>/<strong>Winter</strong> <strong>2015</strong><br />

5<br />

CYBER RISKS – OLD RISKS<br />

MANIFESTING IN NEW WAYS<br />

The threats posed by cyber risks to UK businesses are immense. There is a<br />

need for the government to raise awareness and for insurers to develop more<br />

sophisticated policies. Ed Lewis explains why.<br />

Mankind craves convenience and across the globe<br />

increasingly relies on computers, smartphones and the<br />

internet to deliver it. In fact, technology dominates our lives<br />

and provides surrogates for many of our daily activities:<br />

or gain access to our digital assets is vulnerable, especially<br />

if we connect it to the Internet. Just like your home – anyone<br />

can try to get in. Whether they succeed and what they can do<br />

once inside, however, is down to our behaviour and security.<br />

■■<br />

■■<br />

■■<br />

■■<br />

■■<br />

spaces for working and socialising<br />

communication<br />

access to knowledge and information<br />

storage of important records and data<br />

managing our money.<br />

In terms of scale, the potential is also vast. The average<br />

smart phone fits in your back pocket, yet has the equivalent<br />

capacity of about 5,000 filing cabinets!<br />

Technology therefore makes traditional crimes such as theft,<br />

fraud, blackmail and vandalism not only easier but also<br />

more lucrative than ever before. The internet also makes it<br />

possible to commit them remotely and with total anonymity.<br />

However, advancements in technology have also heralded a<br />

new danger, cyber threats. We’ve all heard about this danger,<br />

but what is it, really?<br />

Essentially it’s the new way in which technology exposes<br />

us to “old” risks because of how we use it and what we<br />

use it for. New phrases to describe this phenomenon<br />

have emerged, such as cyber fraud, cyber espionage<br />

and hacktivism.<br />

However, general understanding and knowledge of cyber<br />

threats within the insurance market (including brokers,<br />

underwriters and policy holders) remains limited.<br />

What exactly are cyber risks?<br />

Increasingly we store the things we value most in digital<br />

form. Examples include data, such as personal information,<br />

money and trade secrets. Guarding against cyber risks is<br />

therefore principally about protecting these digital “assets”<br />

from deliberate or accidental harm.<br />

Not only are digital assets easier to manage, they can be<br />

accessed, copied or shared at the click of a button. But<br />

beware of this convenience; any device that we use to store<br />

Sadly then, cyber safety is too often overlooked in favour of<br />

efficiency. Just because the dangers posed by technology<br />

are not always visible, it doesn’t mean they’re not there.<br />

Better rules to develop and govern our behaviour when<br />

using technology are therefore essential.<br />

So remember, next time you hear someone mention cyber<br />

threats don’t dismiss them as an IT problem. These threats<br />

come from the abuse of technology: either deliberate<br />

abuse to facilitate criminal activity or accidental abuse<br />

through human error, but both can have equally disastrous<br />

consequences. The things you value, or which others value<br />

and you look after, could be at risk!<br />

It’s also about culture: how we allow the abuse to happen<br />

and our efforts at prevention. We can approach cultural<br />

change at various levels: individually; organisationally;<br />

nationally; even globally. But with the threats so prevalent<br />

and constantly evolving, ultimately change is needed if they<br />

are to be controlled.<br />

So remember, next time you hear someone<br />

mention cyber threats don’t dismiss them<br />

as an IT problem. These threats come from<br />

the abuse of technology.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!