Cyber Crime in the Hotel Industry

Cooke and Mason
6 Jan 201703:49

Summary

TLDRThe video script addresses the inevitability of cybercrime and the impracticality of total digital disconnection as a solution. It emphasizes the importance of insurance coverage tailored to cyber threats, employee education to recognize and avoid attacks, and robust IT security measures. The script offers practical advice and resources, including insurance guidance and educational materials, to help businesses mitigate cyber risks effectively.

Takeaways

  • 🔒 Cybercrime is often invisible and can occur without your knowledge.
  • 🌐 Disconnecting completely from the internet and electronic devices is an extreme but sure way to avoid cybercrime.
  • 💡 Pretending cybercrime won't happen is not a viable strategy; it's important to take proactive measures.
  • 🛡 Investing in cybersecurity insurance can provide financial support in the event of a cyberattack.
  • 📜 Cyber policies typically cover a range of costs including data recovery, forensics, hardware replacement, and crisis management.
  • 👥 Employee education is crucial as many cyberattacks exploit human error; policies and procedures should be communicated clearly.
  • 🔐 Just like physical security, IT security requires investment in measures like firewalls, secure access controls, and monitoring systems.
  • 🚀 To improve cybersecurity, start by assessing your current measures and identify areas for enhancement.
  • 📚 Cooke and Mason offer free guides and resources on their website to help businesses enhance their cybersecurity posture.
  • 📞 For personalized advice, businesses can reach out to Cooke and Mason's hotels team for expert consultation.

Q & A

  • What is the first step recommended to mitigate the risk of cybercrime for businesses?

    -The first step recommended is to get insurance cover that includes cybercrime protection, as it provides financial support when things go wrong.

  • Why is it unlikely that a main commercial policy will cover cybercrime?

    -It is unlikely because cybercrime involves specific risks such as hacking, cyber extortion, and data breaches, which require specialized coverage that a general commercial policy does not typically provide.

  • What are some of the losses that a cyber policy can cover?

    -A cyber policy can cover losses such as data recovery, forensic data investigations, hardware and network replacement, crisis management, and credit or identity theft monitoring.

  • How can businesses prevent cybercrime from exploiting their staff?

    -Businesses can prevent cybercrime by educating their employees about potential threats, implementing policies and procedures, and keeping staff updated on new threats and techniques.

  • What is the importance of IT security in preventing cybercrime?

    -IT security is crucial as it helps protect against unauthorized access and data breaches. It includes measures like installing locks on digital 'doors', investing in alarm systems like firewalls, and monitoring with systems like CCTV for cyber threats.

  • What is the recommended approach for businesses that want to limit the risk and impact of cybercrime?

    -The recommended approach is to accept the possibility of cybercrime and actively seek systems and expertise to limit risk and reduce impact, rather than pretending it won't happen or completely disconnecting from digital services.

  • What are some of the actions that businesses can take to move from their current state to a more secure one against cybercrime?

    -Businesses can take actions such as obtaining cyber insurance, educating employees, enhancing IT security, and consulting with experts to move towards a more secure state against cybercrime.

  • Where can businesses find more information and resources to defend against cybercrime?

    -Businesses can find more information and resources on the Cooke and Mason website under the section for hotels, where they can download free guides and access contact details for further assistance.

  • What is the contact number for businesses to call and speak to the hotels team at Cooke and Mason?

    -The contact number for businesses to call is 01 77 86 99 00.

  • How can businesses stay updated on cybercrime prevention strategies?

    -Businesses can stay updated by following Cooke and Mason on social media, where they may share new insights and strategies for cybercrime prevention.

  • What is the significance of having a specific cyber policy for businesses?

    -Having a specific cyber policy is significant as it ensures that businesses have tailored coverage for cyber-related incidents, which are not typically covered under general commercial insurance policies.

Outlines

00:00

🔒 Cybercrime Overview and Mitigation Strategies

The video script begins by addressing the common inquiry about cybercrime and offers a brief overview. It humorously suggests that to avoid cybercrime entirely, one could disconnect from all digital devices, an impractical solution. The script then pivots to a more realistic approach, advocating for insurance coverage tailored to cyber threats, which is crucial as standard commercial policies often do not cover cybercrime. It emphasizes the importance of a specific cyber policy that can provide financial support in the event of cyber incidents, including hacking, extortion, and data breaches. The video also stresses the need for employee education to prevent cyberattacks that exploit human error, suggesting that companies should establish and communicate clear policies and procedures to their staff. Lastly, the script advises on bolstering IT security measures, drawing an analogy to physical security for homes, to protect against cyber intrusions. The video concludes by directing viewers to the Cooke and Mason website for further resources and contact information for the hotels team.

Mindmap

Keywords

💡cybercrime

Cybercrime refers to criminal activities carried out using digital technology or the internet. In the video, cybercrime is the central theme, with various examples given to illustrate its elusive nature, such as it being hard to spot or even notice until it's too late. The video emphasizes the importance of being proactive in protecting against cybercrime rather than relying on the hope that it won't happen.

💡insurance cover

Insurance cover, specifically in the context of the video, refers to a policy that provides financial protection against losses resulting from cybercrime incidents. The script mentions that a standard commercial policy is unlikely to cover cybercrime, hence the need for a specific cyber insurance policy. This policy can cover a range of costs associated with cyber incidents, including data recovery and forensic investigations.

💡cyber extortion

Cyber extortion is a form of cybercrime where criminals threaten to cause harm, such as releasing sensitive data, unless a ransom is paid. The video script highlights this as one of the sinister losses that a cyber policy should cover, emphasizing the need for specialized insurance to protect against such threats.

💡data recovery

Data recovery in the video refers to the process of retrieving lost or inaccessible data after a cyber incident. It is mentioned as one of the services that a cyber policy might cover, illustrating the importance of having the means to restore critical information after an attack.

💡forensic data investigations

Forensic data investigations involve the analysis of digital data to uncover evidence of cybercrime. The video script suggests that a cyber policy can cover the costs of such investigations, which are crucial for understanding the nature of an attack and potentially identifying the perpetrators.

💡hardware and network replacement

Hardware and network replacement refers to the process of repairing or replacing damaged infrastructure following a cyber attack. The video script includes this as part of the coverage provided by a cyber policy, highlighting the financial implications of cyber incidents and the need for insurance to mitigate these costs.

💡crisis management

Crisis management in the context of the video involves the strategies and actions taken to manage the immediate and long-term effects of a cyber incident. The script mentions that a cyber policy can cover crisis management, which is essential for businesses to maintain operations and reputation during and after a cyber attack.

💡credit or identity theft monitoring

Credit or identity theft monitoring is a service that tracks and alerts individuals or businesses to potential fraudulent activities involving their personal or financial information. The video script includes this as part of the coverage offered by a cyber policy, emphasizing the proactive approach businesses should take to protect against the ongoing risks of identity theft following a cyber incident.

💡employee education

Employee education in the video is about training staff to recognize and respond to potential cyber threats. The script points out that many cyber attacks exploit human error, such as clicking on malicious links, making employee education a critical component in a company's cybersecurity strategy.

💡IT security

IT security, as discussed in the video, encompasses the measures taken to protect an organization's information technology infrastructure from threats. The script uses the analogy of physical security, like locks and alarms, to emphasize the importance of investing in IT security to prevent cyber intrusions.

💡risk mitigation

Risk mitigation in the video refers to the strategies and actions taken to reduce the likelihood and impact of cybercrime. The script encourages businesses to accept the possibility of cyber incidents and to actively seek out systems and expertise to limit their risk, such as through insurance, employee training, and robust IT security measures.

Highlights

Cybercrime is not always easily detectable and can be ongoing without your knowledge.

To avoid cybercrime completely, one could disconnect from all digital devices and the internet.

Pretending cybercrime won't happen is not a viable option due to responsibilities to customers, colleagues, and shareholders.

Accepting the likelihood of cybercrime and seeking ways to limit risk and reduce impact is a proactive approach.

Insurance cover is crucial for financial support in the event of a cybercrime incident.

Cyber policies are necessary as standard commercial policies typically do not cover cybercrime.

Cyber policies can cover a range of losses including hacking, extortion, and data breaches.

Employee education is key to preventing cyberattacks that exploit staff as an entry point.

Regular updates on new threats and techniques are essential for staff awareness.

Investing in IT security measures is as important as physical security for a business.

Cooke and Mason offer free guides and resources on their website to help businesses combat cybercrime.

Contact details for the hotels team at Cooke and Mason are provided for further assistance.

The importance of following best practices and seeking professional advice to mitigate cybercrime risks is emphasized.

Cybercrime prevention involves a combination of insurance, employee training, and robust IT security.

Cooke and Mason's website provides resources to help businesses enhance their cybercrime defense strategies.

Engaging with social media platforms can offer additional insights and updates on cybercrime trends.

Transcripts

play00:04

welcome to cook and Mason we get asked a

play00:08

lot about cybercrime so here is a quick

play00:11

overview stick around till the end for

play00:13

details and how you can find out more

play00:17

wouldn't it be great if cybercrime

play00:19

looked like this easy to spot

play00:21

easy to do something about but it

play00:24

doesn't sometimes cybercrime looks like

play00:27

this all the times it looks like this

play00:29

and sometimes you never even know it's

play00:32

happening

play00:32

it could be going on right now so what

play00:36

are our choices well if we want to be

play00:39

100% certain we can't become a victim of

play00:42

cyber crime then when this video

play00:43

finishes switch off your computer switch

play00:46

them all off and the smartphones and the

play00:49

tablets no email no internet and no

play00:51

website bookings no electronic payments

play00:55

just cold hard cash and keep it under a

play00:57

mattress go old-school real old-school

play01:01

not an option didn't think so so what's

play01:05

left well we can always pretend it won't

play01:08

happen to us I mean what are the chances

play01:11

you're right that's not really an option

play01:14

either we have responsibilities to

play01:16

customers our colleagues and our

play01:19

shareholders so how about this

play01:21

we accept there's a good chance it will

play01:23

happen and we look for systems and

play01:25

people who can help us limit the risk

play01:28

and reduce the impact first things first

play01:31

if you haven't already got it then sort

play01:34

yourself some insurance cover that way

play01:36

when it does go wrong you have financial

play01:38

support your insurance broker will have

play01:41

spoken to you about cyber cover and it

play01:43

really is important it is very unlikely

play01:46

that your main commercial policy will

play01:48

cover cybercrime you need to purchase a

play01:51

specific policy to cover the more

play01:53

sinister losses such as hacking cyber

play01:56

extortion and negligent transmission of

play01:59

personal data a cyber policy can cover

play02:02

data recovery forensic data

play02:04

investigations hardware and network

play02:06

replacement crisis management and credit

play02:10

or identity theft monitoring to name a

play02:12

few secondly educate your employees a

play02:17

lot of these attacks exploit staff we

play02:21

are the easy way in we will click on

play02:23

that link when daven account sends us an

play02:25

email about the new company bonus scheme

play02:28

get your policies and procedures in

play02:31

and let your staff know what to expect

play02:33

and what to look out for keep them

play02:36

updated about new threats and techniques

play02:38

that are being used thirdly look at your

play02:42

security if you knew someone wanted to

play02:44

break into your house you would put

play02:46

locks on the doors you would invest in a

play02:48

good alarm system and install CCTV but

play02:53

it can be easy to overlook IT security

play02:55

because the available control measures

play02:57

aren't as obvious so that's three things

play03:00

that will help defend your business from

play03:02

the risks of cybercrime but how do you

play03:05

go from where you are now to where you

play03:08

need to be well you may already have

play03:10

some of this in place which is great or

play03:12

you may want to chat it through we have

play03:15

information on our website at Cooke and

play03:17

Mason comm forward slash hotels here you

play03:21

can download some free guides that look

play03:23

at this a little deeper you will also be

play03:26

able to find all our contact details on

play03:28

there if you prefer then pick up the

play03:31

phone and call us on zero one seven

play03:35

seven seven eight six nine nine zero

play03:39

zero and ask to speak to the hotels team

play03:43

thank you for listening and why not

play03:45

follow us on social media

Rate This

5.0 / 5 (0 votes)

相关标签
CybercrimeBusiness SecurityRisk MitigationEmployee EducationInsurance CoverageCyber PolicyData ProtectionIT SecurityCyber ExtortionCyber Awareness
您是否需要英文摘要?