Twelve recommended cyber hygiene controls for your organization to implement include:
Implementing these controls will help increase your organization's cyber hygiene and improve your security posture. Download our cyber report Cyber resilience: Twelve key controls to strengthen your security to learn more about each of these controls, why they should be adopted, and how to implement them.
As cyberattacks become more prolific, related insurance claims follow, meaning underwriters have been able to identify a correlation between certain controls and corresponding cyber incidents. Through this analysis and the continuous examination of relevant data points, the insurance industry has a rich understanding of the technical steps that organizations can take to build their cyber resiliency.
However, due to the growth in attritional losses, consequently insurers are now taking a much more cautious position. Insurers are tightening their underwriting terms, carefully analyzing all cyber insurance applications, and asking more questions than ever before about an applicant’s cyber operating environment and risk controls.
The adoption of certain controls has now become a minimum requirement of insurers, with organizations’ potential insurability on the line. Organizations are undoubtedly placing more emphasis on controls than ever before to help mitigate their ransomware risks and improve their overall cybersecurity position and resilience.
Organizations are recommended to implement a number of cyber hygiene controls that are key to achieving cyber resilience and insurability.
While these controls have been established best practice for several years, some companies are still struggling to adopt them — most often because they have been unable to justify the cost of implementation, did not deploy them comprehensively, or did not understand or see the need for controls. In many regulated industries where cyber resilience controls have been required for years, the effort was often more about checking a box, than enhancing security.
Marsh has recommended 12 key cybersecurity controls providing practical deep dives into their characteristics and requirements. Complete the form to receive a deep dive to help build your organization’s cyber resilience.