NOT FOR REPRINT
Page Printed from: propertycasualty360.com/author/profile/stu-sjouwerman/
Consistent training presented in a variety of formats creates an effective strategy for managing cyber risks.
A common scam has evolved from stealing money from companies to taking actual products that they produce or sell.
Social engineering attacks rely on humans to succeed and organizations must focus on training that includes simulation exercises to mitigate risks.
As ransomware attacks wane, phishing continues to be the weapon of choice for system access.
Modern email scams are harder to spot, are more targeted and appear authentic to the untrained eye.
AI and crowd-sourced intelligence can be a game-changer at detecting phishing attacks in real-time.
While most companies store customer data or process transactions, only 20% have cyber coverage.
Suspicious emails and fake file attachments are just two of the indicators of phishing to watch for.
Ransomware attacks have grown in frequency and severity this year with an average cost of $4.4 million.
With so many working remotely, cybersafety becomes a paramount concern for businesses and their employees.
{ "author": { "name": "Stu Sjouwerman", "webUrl": "/author/profile/stu-sjouwerman/", "description": "", "imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g", "estimate": 11, "social": [], "articles": [ { "uri": "/2023/04/18/stranger-danger-keys-to-avoiding-scams-cyber-missteps/", "title": "Stranger danger: Keys to avoiding scams & cyber missteps", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "April 18, 2023", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/04/Email-threat_JustSuper_Adobe-Stock.jpg", "width": "620", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "Consistent training presented in a variety of formats creates an effective strategy for managing cyber risks.", "body": null }, { "uri": "/2023/01/09/ceo-scammers-are-now-shipmentlifting-physical-goods/", "title": "CEO scammers are now 'shipmentlifting' physical goods", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "January 09, 2023", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2023/01/Delivering-product_WavebreakmediaMicro_AdobeStock.jpg", "width": "620", "height": "373" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "A common scam has evolved from stealing money from companies to taking actual products that they produce or sell.", "body": null }, { "uri": "/2022/08/10/are-you-aware-of-these-social-engineering-tactics/", "title": "Are you aware of these social engineering tactics?", "byline": "Stu Sjouwerman", "kicker": "Expert Opinion", "prettyDate": "August 10, 2022", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/08/Deepfake_mike.jpg", "width": "619", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/expert-opinion/", "sectionName": "Expert Opinion" } ], "summary": "Social engineering attacks rely on humans to succeed and organizations must focus on training that includes simulation exercises to mitigate risks.", "body": null }, { "uri": "/2022/06/09/cyberthreats-2022-what-we-know-so-far/", "title": "Cyberthreats 2022: What we know so far", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "June 09, 2022", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/06/Polymer-manufacturer-Albert-Karimov.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "As ransomware attacks wane, phishing continues to be the weapon of choice for system access.", "body": null }, { "uri": "/2022/03/24/phishing-scams-watch-out-for-these-4-tell-tale-signs/", "title": "Phishing scams: Watch out for these 4 tell-tale signs", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "March 24, 2022", "timeToRead": "4 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/03/Phishing-tippapatt.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "Modern email scams are harder to spot, are more targeted and appear authentic to the untrained eye.", "body": null }, { "uri": "/2022/01/24/3-reasons-why-humans-are-the-strongest-defense-against-phishing-attacks/", "title": "3 reasons why humans are the strongest defense against phishing attacks", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "January 24, 2022", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2022/01/Phishing_wk1003mike.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "AI and crowd-sourced intelligence can be a game-changer at detecting phishing attacks in real-time.", "body": null }, { "uri": "/2021/04/08/can-a-business-forgo-a-cyber-insurance-policy/", "title": "Can a business forgo a cyber insurance policy?", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "April 08, 2021", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2021/04/Cyber-insurance_Den-Rise.jpg", "width": "614", "height": "371" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "While most companies store customer data or process transactions, only 20% have cyber coverage.", "body": null }, { "uri": "/2021/02/05/phishing-watch-out-for-these-6-tell-tale-signs/", "title": "Phishing: Watch out for these 6 tell-tale signs", "byline": "Stu Sjouwerman", "kicker": "Slideshow", "prettyDate": "February 05, 2021", "timeToRead": "3 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/08/bigstock-phishing-75958097.jpg_Falcon.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/slideshow/", "sectionName": "Slideshow" } ], "summary": "Suspicious emails and fake file attachments are just two of the indicators of phishing to watch for.", "body": null }, { "uri": "/2020/10/20/5-steps-to-recovering-from-a-ransomware-attack/", "title": "5 steps to recovering from a ransomware attack", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "October 20, 2020", "timeToRead": "6 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/10/Ransomware-attack-rawf8_Shutterstock_Falcon.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "Ransomware attacks have grown in frequency and severity this year with an average cost of $4.4 million.", "body": null }, { "uri": "/2020/05/25/6-tips-for-working-from-home-securely/", "title": "6 tips for working from home securely", "byline": "Stu Sjouwerman", "kicker": "Best Practices", "prettyDate": "May 25, 2020", "timeToRead": "5 minute", "image": { "uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2020/05/Remote-worker_Falcon.jpg", "width": "616", "height": "372" }, "authors": [ { "webUrl": "/author/profile/stu-sjouwerman/", "name": "Stu Sjouwerman" } ], "kickerNode": [ { "uri": "/best-practices/", "sectionName": "Best Practices" } ], "summary": "With so many working remotely, cybersafety becomes a paramount concern for businesses and their employees.", "body": null } ] } }
From gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download ResourceFrom OneShield
Commercial insurers have faced many challenges in 2023 due to a record number of billion-dollar weather events, inflation and a tightening reinsurance market. The increasing focus on individual risk levels in the reinsurance market requires insurers to embrace new technology, data, and tools to improve loss ratios and customer satisfaction. This eBook explores solutions to navigate these challenges and enhance risk management capabilities.
Download ResourceFrom Origami Risk
Explore common pitfalls in core insurance transformations and how to avoid them. Discover comprehensive strategies and best practices to successfully plan and execute a cloud implementation in this comprehensive white paper.
Download ResourceFrom gryphon.ai
This guide empowers insurance carriers and risk managers to navigate complex regulations, safeguarding their brands from costly SMS and text messaging penalties.
Download ResourceFrom Origami Risk
Navigating the complexities of P&C core insurance digitization is no easy task. Explore the critical decisions between building or buying and how to achieve operational excellence in this white paper.
Download ResourceFrom Melissa
As more customers “unbundle” their insurance products and spread their business among many carriers, agents must look for creative strategies to retain and grow business. Download this white paper to learn top strategies to ensure success in 2024.
Download ResourceFrom gryphon.ai
Empower your organization to excel in marketing outreach without compromising compliance. This guide offers a roadmap to implement a best-in-class contact compliance strategy so that your organization can continue successful marketing campaigns, ethically and legally.
Download ResourceFrom gryphon.ai
Is your organization protected against costly Do Not Call (DNC) and Telephone Consumer Protection Act (TCPA) violations and fines? This comprehensive checklist explores key compliance areas, offering insights to mitigate risks and protect your brand reputation in 2024.
Download Resource