RSM Global

Data privacy and cyber security services

KRACK Wi-Fi exploit highlights core vulnerabilities of the internet

Mind the KRACK - How the KRACK Wi-Fi exploit highlights the core vulnerabilities of the internet. KRACK (Key Reinstallation AttaCK) is a severe replay attack on the Wi-Fi Protected Access protocol that secures Wi-Fi connections and targets the third step in a four-
3 November 2017

When it comes to cyber, 'underinsured' means 'underprepared'

A blog by Michael Shatter, Director of Risk Assurance Services, RSM Australia. Throughout the evolution of cyber insurance one thing has become clear; defence barriers can never be fully impenetrable and therefore, you are never fully protected. This is what makes insurance the back bone of cyber protection. Organisations of all sizes need to invest in security procedures and tools to make the business as resilient as possible. 'Underinsured' means 'underprepared'. 
13 July 2017

Cyber threat has no borders

The ransomware cyber-attack that took place in May 2017 was unprecedented in scale and affected more that 230,000 computers in 150 countries. The indiscriminate attack on hospitals and government agencies exploited known vulnerabilities in old systems of Microsoft Windows operating systems. Cyber security now supersedes all technology risks for businesses, and this attack shows many have not yet responded to the threat. Some markets boast sophisticated technology and regulations, while others have restricted access to digital infrastructure. No matter where you look, however, there is one constant. In the arms race between cyber criminals and experts, neither party ever draws far ahead.
15 May 2017

Tackling cybercrime complacency – how to protect your organisation

The Icarus effect: tackling cybercrime complacency Do you know what a cyberattack looks like? Is your organisation prepared to defend itself?
14 May 2017

Global ransomware outbreak

You will have noticed significant media coverage of an outbreak of ransomware globally which impacted 10,000 organisations in over 150 countries including Britain’s National Health Service and automaker Renault.
14 May 2017

5 key considerations for effective business interruption coverage

Most key business processes are now automated and built on technology. Consequently, disruptions from a cyberattack can lead to significant lost sales and productivity, recovery costs and reputational harm. Accounting for business interruption costs is almost as important as mitigating the breach itself, especially as exposure is only expected to increase in the future.
28 April 2017

Changing cyber security regulation: How does it impact middle market businesses?

Cyber risk is an ever evolving threat for 21st century business and as such, is a top of mind issue for today’s business leaders. A cyber security breach can have huge legal and financial ramifications for any business. High profile cyber-attacks are on the rise and governments are increasingly cracking down on cyber criminals. 
10 March 2017

Cyber risks: How middle market businesses can protect themselves and their customers

Middle market businesses are often at risk of the same scams and cyber attacks that affect individuals, and should take steps to protect themselves. The cost of a security breach can be huge, not to mention the reputational damage a high-profile breach can cause.
1 March 2017

Manufacturers pay a steep price for data vulnerability

When it comes to information technology security, no company or industry is immune to unauthorised access to its data. Yet when it comes to their own companies, many manufacturers feel it unlikely that their data will be a target of any breach attempts. 
12 January 2017

Pages

 

Risk advisory brochures:

services

sectors

gdpr

Contact us by phone

+44 207 601 1080

 or submit your questions, comments, or proposal requests.

                 email us

As hackers become more advanced and expand their reach and methods, the middle market must increase its focus on cyber security. Just one incident can have significant financial reputational and regulatory consequences.

Contact RSM to see how you can reduce the likelihood of a breach, improve detection, respond to incidents, and begin recovery as soon as possible.

riskadvisory@rsm.global