{"id":10182,"date":"2023-08-22T11:06:00","date_gmt":"2023-08-22T09:06:00","guid":{"rendered":"https:\/\/www.assap.ad\/i-need-cyber-risk-insurance\/"},"modified":"2024-10-23T18:47:17","modified_gmt":"2024-10-23T16:47:17","slug":"i-need-cyber-risk-insurance","status":"publish","type":"post","link":"https:\/\/www.assap.ad\/en\/insurances-andorra\/blog\/i-need-cyber-risk-insurance\/","title":{"rendered":"Do I need cyber risk insurance?"},"content":{"rendered":"\n<p>The digital age is a fact. Right now you are reading these words on a web page, whether from your computer, tablet or smartphone, and even though it is not a physical world, this does not mean that you are not exposed to dangers. <\/p>\n\n<p><strong>Cyberattacks<\/strong> are becoming more frequent and it would not be the first time that we have seen how large corporations have been affected worldwide because their systems have been accessed. Many damages resulting from this <strong>cyberattack<\/strong> not only affect a company itself, but also trigger a series of responsibilities towards all its clients. In the face of these attacks, <strong>cybersecurity<\/strong> has become one of the main demands of companies.  <\/p>\n\n<p><strong>Cybercriminals<\/strong> are not resting. Even during the Coronavirus pandemic, many hospitals were attacked in order to steal their patients&#8217; personal data. Data protection has become particularly important with the new <strong>General Data Protection Regulation (GDPR)<\/strong> and this makes obtaining this information by criminals a reason to extort companies by threatening to make all the data public.  <\/p>\n\n<p>Unfortunately, the list of types of <strong>cyberattacks<\/strong> is becoming increasingly long, increasing the likelihood that your company will suffer one. While a few years ago, only a few companies thought about taking out cyberattack insurance, today this trend is changing. <br\/> <\/p>\n\n<h3 class=\"wp-block-heading\">But what is a cyber attack?<\/h3>\n\n<p>A <strong>cyber attack<\/strong> is a <strong>breach of the computer systems<\/strong> of a company or network that depends on technology, where malicious codes are used to alter the computer systems and can compromise your company&#8217;s important information, and in the worst case even steal the identity of users in order to <strong>commit cyber crimes.<\/strong><br\/> <\/p>\n\n<h3 class=\"wp-block-heading\">Most common types of cyberattacks<\/h3>\n\n<p><br\/><strong>Malware:<\/strong><br\/> <strong>Malware<\/strong> is malicious software that is installed on the system causing:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>alteration of the equipment.<\/li>\n\n\n\n<li>blocking network access (ransomware).<\/li>\n\n\n\n<li>the appropriation of personal information (spyware).<\/li>\n<\/ul>\n\n<p>The purpose of all of them is to be able to obtain compromised information, breach computer connections or create backup copies and publish them on the Internet.<\/p>\n\n<p><br\/><strong>Phishing:<\/strong><br\/> <strong>Phishing<\/strong> is a way of stealing sensitive data, usually through <strong>email<\/strong> . Hackers often use this method to steal data such as credit card numbers or passwords from <strong>trusted sources<\/strong> . <br\/><br\/><strong>Man-in-the-middle attacks:<\/strong><br\/> <strong>Man-in-the-middle (MitM) attacks<\/strong> or eavesdropping attacks usually occur through a <strong>public or unprotected Wi-Fi network<\/strong> . <strong>Hackers<\/strong> can easily access your computer without you realizing it and steal the information you are passing over the Internet.<br\/> Additionally, once they have control of the device, they can install <strong>malware<\/strong> to steal protected information. <\/p>\n\n<p><br\/><strong>Denial of Service Attack:<\/strong><br\/> In distributed denial of service (DDoS) attacks, several devices are compromised to unleash attacks on the system so that processes and requests cannot be completed, hogging bandwidth and saturating the network, causing serious damage to the system.<\/p>\n\n<p><br\/><strong>SQL Injection<\/strong><br\/> <strong>SQL injection attacks<\/strong> occur through <strong>web applications<\/strong> . Malicious lines of code are inserted in order to obtain <strong>private information<\/strong> from company servers. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digital age is a fact. Right now you are reading these words on a web page, whether from your computer, tablet or smartphone, and even though it is not a physical world, this does not mean that you are not exposed to dangers. Cyberattacks are becoming more frequent and it would not be the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6479,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-10182","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/10182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/comments?post=10182"}],"version-history":[{"count":1,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/10182\/revisions"}],"predecessor-version":[{"id":10184,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/posts\/10182\/revisions\/10184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/media\/6479"}],"wp:attachment":[{"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/media?parent=10182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/categories?post=10182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.assap.ad\/en\/wp-json\/wp\/v2\/tags?post=10182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}