Sunday, 26 May 2013

HSB introduces new coverage to protect small businesses from cyber-attacks, cyber warning hass associates reviews, article code 85258083266-HA


 The Hartford Steam Boiler Inspection and Insurance Company (HSB) has launched a new cyber risk insurance coverage to safeguard smaller commercial organizations from growing information security exposures threats.
Providing broad coverage with limits up to $100,000 to protect the risks typical of small organizations, HSB CyberOne helps policyholders to recover from damage to systems caused by a computer attack.
The solution also offers defense and liability coverage for certain lawsuits that allege third-party damage resulting from a failure by the insured to adequately secure its own computer system.
Hartford Steam Boiler president and chief executive officer Greg Barats said HSB CyberOn has been developed as a simple way for a business to help protect its computer systems against cyberattacks.
''It's a logical extension of Hartford Steam Boiler's series of products for smaller businesses that cover identity theft, data breach and data risks from equipment breakdowns,'' Barats added.
HSB CyberOne proves to be more affordable than products underwritten one policy at a time for insurers as it is added to a group of their small business policies.
Capable of being included as part of a business owners product (BOP) or a Commercial Multi-Peril (CMP) policy, the product also makes it convenient for customers and agents to access and easier for insurers to administer.

A member of Munich Re, HSB provides a range of specialty insurance coverages for business, home and farm, since 2009.

Sunday, 12 May 2013

Hass and Associates Online Crime Ware Warning and Online Fraud Watch



It’s the last thing security professionals want to see: A new hacking method that makes it even harder to detect suspect code in emails. The method is actually a stealthy combination of two favorite attack modes, and it shows that hackers are pulling out all the stops to ensnare computer users in their webs.
Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing.

“The technique allows you to hit a lot of people very quickly and largely go undetected,” Dave Jevans, founder and CTO of Marble Security and founder of the Anti-Phishing Work Group, told TechNewsWorld.

With spear phishing, which is typically used as a vehicle for advanced persistent threat attacks like the recent one on The New York Times, a select group of connected people are targeted with a highly credible email message based on extensive research of the targets’ backgrounds.
“With longlining, you can get hundreds of people exposed to a website that will infect their computers,” Jevans noted.

He explained that longliners — named after commercial fishermen who use long lines of hooks to catch fish — might send 100,000 emails from 50,000 IP addresses, which makes it difficult to identify an email from a particular server as hacking bait.



Thursday, 9 May 2013

Internet Security Hass Associates Tips and Review




Én av fem australske bedrifter LED en elektronisk brudd eller cyberangrep i 2012. De fleste rapporter et gjennomsnitt på to angrep i året. Selskaper sette deres egen evne til å effektivt sikre deres virksomhet på 4.5 ute av 10. Australia er nå 21 i listen mest angrepet nasjoner opp fra 24th.
Statistikk på mangelen på business cybersikkerhet og økning i cyber-angrep florerer. Det er ikke rart eksperter fortsette å advare at dårlig sikkerhetsrutiner kan invadere selskapets økonomi og sette kommersielle og kundeinformasjon i gale hender.
følge Australias Computer Emergency Response Team (CERT) 2012 Cyber kriminalitet og undersøkelsen sikkerhetsrapporten i februar var 20 prosent av australske foretak gjenstand for hacking eller andre cyber-angrep i fjor.
Den mest alvorlige involvert i bruk av skadelig programvare inkludert ransomware og scareware, som utpresse angelsakserne for betaling for retur av data. Trojan eller rootkit malware, som lodge i selskapets systemer for å stjele informasjon; tyveri eller brudd på konfidensiell informasjon; og denial-of-service (DoS)-angrep.
I operasjonen Lino, Australias største etterforskning kompromittert kredittkort, ble det funnet at en rumensk kriminelle syndikat fått tilgang til 500.000 australske kredittkort, og rundt 30.000 kredittkort ble brukt for falske transaksjoner som beløper seg til mer enn $30 millioner.