IT & Cyber Risk

Our IT and Cyber Risk Practice provides sound and accurate information for claims and risk pricing.

We have found that a case by case approach is demanded by each industry sector. Increasing reliance upon Cloud and other third party vendors can lead to unknown factors.

Types of Data Breach

There is a misconception that most breaches are caused by malicious attacks. However it is actually human and system error that represents the majority of breaches.

Examples of common data breaches include:
-

  • Loss of unencrypted portable devices

  • Stray emails, letters, faxes, documents

  • Inadequate destruction of data
  • Technical security failures

  • Malware / virus attacks (unsecured networks)

  • Denial of service attacks
  • Property crimes (stolen computers, mobile phones, USB drives)

  • Inside job (employee steals information)

  • Phishing scams
  • Spear-phishing (social engineering)
  • Advanced persistent threats


How can Concordia help?


Analysis

Risk Assessments highlighting vulnerabilities and measuring cyber related exposure 

Prevention

Identifying risk exposure by analysing:
-

  • Compliance and Risk Management measures.
  • Testing of data level encryption and anti-penetration measures.
  • Challenging existing Business Continuity and Disaster Recovery plans.


Post Cyber Event Response

Concordia provides a fast pro-active support in the containment of a breach and investigations to quickly identify the ‘who, what, when and how’.

Concordia Consultancy Ltd © 2012
Website T's &' C's   |    Concordia Consultancy T's & C's   |    Privacy Policy   |    Sitemap   |    Accessibility   |    Print Page