Cyber

"It’s beginning to look a lot like Phishing…"

Did you know that most cases of cyberattack and online fraud begin with an e-mail? Munich Re observes that phishing is still one of the top threat vectors to distribute malware or to harvest critical data like credentials in order to conduct scams. During the Covid-19 pandemic, phishing e-mails spiked using pandemic-related topics as a vehicle. 

07.12.2020

In April 2020 alone, Google blocked 18 million malware and phishing emails related to the coronavirus each day. Cybersecurity researchers reported that the annual holiday season is also a very popular time to spread phishing e-mails and engage in related online fraud. More online shopping than ever is expected for this year´s Christmas season. This seems to make Covid-19 and Christmas the perfect combination for cybercriminals to boost their revenues. The expected number of online transactions, orders and shopping patterns will create ample opportunities to capture payment data and perform fraudulent transactions. Whereas secure Christmas shopping seems to be more of a challenge for private individuals, remember that all kind of businesses are within the scope of distributed phishing emails. Many of them will be tailored for your employees and targeted towards your business!

Whether we talk about private individuals or risk owners of each scale, too many vulnerabilities are “offered” to cybercriminals. These kinds of “digital presents” are certainly on every hacker's Christmas wish list. Here is the cybercriminal's wish list – to ensure they can “phish you a Merry Christmas”: 

  • No human firewall. Cybercriminals like unsuspecting folk who trust every sender and just click on every link. 
  • No need to know. Someone who posts publicly, or enters personal information everywhere is a hacker's best friend!
  • No monitoring. Every hacker likes a risk owner who does not monitor, filter or block e-mails.
  • Unconfigured and unpatched devices. Even if you do fall victim to a phishing attack, well-configured devices and endpoint defence can prevent malware from being installed. 

Together with our clients, we’re creating cyber solutions that go far beyond traditional risk transfer.

Have yourself a merry little cyber insurance!

 

Our experts
Martin Kreuzer
Martin Kreuzer
Risk Manager Cyber Risks
Print