Close Close
Popular Financial Topics Discover relevant content from across the suite of ALM legal publications From the Industry More content from ThinkAdvisor and select sponsors Investment Advisor Issue Gallery Read digital editions of Investment Advisor Magazine Tax Facts Get clear, current, and reliable answers to pressing tax questions
Luminaries Awards
ThinkAdvisor

Technology > Marketing Technology

Be careful: Here are the 3 technologies most susceptible to cyber attack

X
Your article was successfully shared with the contacts you provided.

Cyber breaches are becoming increasingly common for businesses. But many aren’t yet talking about how to protect themselves in the case of a breach, according to a new report released this week by Zurich Insurance.

Over 88 percent of companies involved in the report said they thought cyber threats were a moderate risk, but only 52 percent of companies actually purchased related insurance coverage this year, according to the report.

Here are the biggest cyber risks for corporations as of 2014.

social media

Social media

Social media plays an integral part of branding for businesses. But oftentimes, by utilizing social media for your clients, you’re gathering important information about them and their personal lives and information. This exposes your company to risk significantly and can lead to damages arising from privacy issues and, the worst, reputational damage.

In the survey, over 64 percent rated highest that in the case of a data breach, their reputation would go down. That survey also included social media reputation, which had a significant amount of respondent saying they would be negatively affected.

See also: Social media from scratch, Part 3: LinkedIn

cloud

Cloud services

Cloud services are becoming more common, with information increasingly being streamed across multiple platforms. This is good, because it helps lower costs. However, the cloud is not infallible and is susceptible to cyber breaches, as we saw most recently during the celebrity nude photo leaks.

Sixty-six percent of respondents to the survey said that their companies had sued cloud services providers for such breaches in the last year, which was up 11% from the year prior. 

mobile

Mobile devices  

As more and more companies have begun allowing employees to bring their own devices (BYOD) into the workplace, questions involving security and maintaining private versus company information on their mobile devices have become common.

Seventy-four percent of respondents said their companies had a mobile device policy, and 47% actually have a BYOD policy.

See also:

Don’t let clients take their passwords to the grave

Top 6 most common breach scenarios to avoid

Your official life insurance M&A outlook for 2015


NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.