As many countries implement sanctions against Russia, an increase in cyberattacks is expected. It’s now more crucial than ever to be mindful and vigilant with your technology and activities to help limit losses due to business interruption and protect yourself and your organization from cyberattacks. The following list outlines the predominant attack vectors to be cautious of:

  1. Emails and attachments – If you weren’t expecting it, be cautious. This includes spam, phishing, and direct targeted emails from compromised accounts. These will typically either have a URL to a malicious site or an attachment with malware (Excel macros) in it. 
  2. Internet marketing and advertisements – These run code in your browser. Advertising hosting sites are commonly used to promote malware through malicious advertisements. Be careful with clicking on advertising links, URLs, and banners.
  3. Malicious software – Typically, free/low cost (freeware) software. Freeware is used to promote malicious code through easily accessible software that appears legitimate. These may contain ransomware, viruses, remote access controls, etc. Be cautious when installing, running, or using these solutions.
  4. Fake support – Hackers and scammers will take advantage of the crisis. This applies to emails, marketing and advertisements, and software donating proceeds. Prior to interacting with, donating to, or purchasing anything in support of Ukraine, please properly research the entity to help keep you, your devices, and your organization secure.

While it’s impossible to eliminate all business risk, these actions can help shore up vulnerabilities. We are here to help with your organization’s needs. 

If you have questions about cybersecurity or business interruption claims, reach out to your advisor, submit the Contact Us form below, or follow us on Twitter for relevant news, tips, and resources.

Related FORsights

Let's Connect

Subscribe to our content or get in touch with us today

Subscribe Contact Us