{"id":7638,"date":"2022-09-28T00:00:00","date_gmt":"2022-09-27T22:00:00","guid":{"rendered":"https:\/\/www.loyco.ch\/actualites\/cyber-news-raising-awareness-to-prevent-cyberattacks\/"},"modified":"2024-07-30T15:18:42","modified_gmt":"2024-07-30T13:18:42","slug":"cyber-news-raising-awareness-to-prevent-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.loyco.ch\/en\/actualites\/cyber-news-raising-awareness-to-prevent-cyberattacks\/","title":{"rendered":"Cybernews: raising awareness to prevent cyberattacks"},"content":{"rendered":"<p><strong>Following the launch of the Cyber Risk Clinic last May, we&#8217;re giving the floor to several cyber experts who are active in this new structure.<br \/>\nIn this series of &#8220;cyber news&#8221;, they decipher for you the issues linked to these particular risks, and share concrete cases of cyber-attacks encountered in their professional practice. <\/strong>  For the second episode in our series on cyber risks, we put 3 questions to <a href=\"https:\/\/www.linkedin.com\/in\/bertrand-fournier\/\" target=\"_blank\" rel=\"noopener\">Bertrand Fournier<\/a>, CEO of <a href=\"https:\/\/silicom.group\/\" target=\"_blank\" rel=\"noopener\">Silicom Group SA<\/a>, partner of the Cyber Risk Clinic. Employee training is the last line of defence when technology has failed to stop certain attacks.  <\/p>\n<h2><strong>Is there a specific type of customer who calls on your services for cyber security issues?<\/strong><\/h2>\n<p>  The customers who call on our Services are, unfortunately and all too often, those who have already been affected by an attack.<br \/>\nThey range from small companies with 2 employees to companies with several dozen employees, who already have specific training needs.<br \/>\nIn short, it&#8217;s fair to say that everyone is affected by the issue, but it <strong>still<\/strong> seems a <strong>long way from the concrete priorities<\/strong> that COVID and rising energy costs in particular may have been.<br \/>\nCompanies are not yet sufficiently aware of the value that stored data can have when cross-referenced with other sources.     <\/p>\n<h2><strong>What are the latest attacks and what is their financial impact?<\/strong><\/h2>\n<p>  The two types of attack for which we currently help and support the most customers are:  <\/p>\n<ol>\n<li><strong>Phishing<\/strong>: a method designed to steal login information and embezzle money by pretending to be an organization, customer or supplier you know.<\/li>\n<li><strong>System encryption by malicious software<\/strong> (malware): an attack that encrypts files on computers, then demands a ransom in exchange for the decryption key.<\/li>\n<\/ol>\n<p>  In the first case, the financial consequences can range from the simple embezzlement of funds by bank transfer to the implementation of more complex systems, linked to the so-called &#8220;man-in-the-middle&#8221; technique, which in some cases has enabled the embezzlement of several tens of thousands of francs, as demonstrated in the case study below.  <\/p>\n<h2><strong>How can we prevent these cyberattacks?<\/strong><\/h2>\n<p>  The most important thing is to avoid the &#8220;onset&#8221; of the attack, by keeping your systems up to date and protecting your network and data with all the best practices available.<br \/>\nThese can range from technical solutions that eliminate the most common fraudulent behaviors, to more complex systems of attack detection and 24\/7 active monitoring. <strong>The last of the defenses that can benefit the user is training<\/strong>.<br \/>\nThat&#8217;s why Silicom Academy invests a great deal of time in building staff awareness courses, making them the last line of defence when technology fails to stop certain attacks.    <\/p>\n<h2><strong>Cyber attack case study<\/strong><\/h2>\n<h3><strong>A company spied on by a hacker for months at a cost of CHF 60,000.<\/strong><\/h3>\n<p>  A hacker managed to break into the systems of a company with around 30 employees, operating in Switzerland and internationally with European Suppliers, which did not use two-factor authentication.<br \/>\nHe hacked into and observed Outlook e-mail exchanges over a period of 3 months.<br \/>\nIncoming and outgoing e-mails were intercepted by passing through a sub-folder, then rewritten to give the interlocutors confidence.<br \/>\nHere&#8217;s a <a href=\"https:\/\/www.loyco.ch\/wp-content\/uploads\/2024\/04\/loy_cyber-news-cas-pratique-silicom-1.png\" target=\"_blank\" rel=\"noopener\">diagram of the attack<\/a> below.<br \/>\nAfter months of work and observation, the hacker intercepts an invoice issued by a well-known Spanish Supplier, using the pretext of an IBAN change to a new Swiss account at UBS.<br \/>\nThe payment, amounting to over CHF 60,000, is validated by the company&#8217;s fiduciary Services and two other persons authorized to validate and make payments internally.<br \/>\nThe money was transferred by the company to an account, which was closed immediately after the transaction, in return for a loss of CHF 60,000 with no cyber cover.<br \/>\nFollowing this, the customer lodged a complaint, which unfortunately had no impact other than to feed the statistics and protect those who had no insurance.         <\/p>\n<h4><a href=\"https:\/\/www.loyco.ch\/wp-content\/uploads\/2024\/04\/loy_cyber-news-cas-pratique-silicom-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-33493 size-full\" src=\"https:\/\/www.loyco.ch\/wp-content\/uploads\/2024\/04\/loy_cyber-news-cas-pratique-silicom-1.png\" alt=\"Case study: cyber attack, changing management rules\" width=\"599\" height=\"338\"><\/a><\/h4>\n<h4><strong>What could have been done to avoid these dramatic developments?<\/strong><\/h4>\n<ul>\n<li>The implementation of two-factor authentication;<\/li>\n<li>Geofencing for bank account connection;<\/li>\n<li>A call back before payment of the invoice with the supplier;<\/li>\n<li>Raising employee awareness would have aroused suspicion and certainly led to a call-back with the customer.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><a href=\"https:\/\/silicom.group\/\" target=\"_blank\" rel=\"noopener\">Silicom Group<\/a> is a partner of the Cyber Risk Clinic in the training and crisis management package.<\/strong> We are delighted to have Silicom Group as a partner of the Cyber Risk Clinic. Specialized in raising awareness among users of all types (executives, employees), their approach is geared towards &#8220;positive&#8221;, non-anxiety-inducing training, enabling employees to make the right decision with confidence, using the skills acquired during their internships or workshops. As a reminder, the Cyber Risk Clinic&#8217;s &#8220;Training&#8221; package is made up of several sections:  <\/p>\n<ul>\n<li>Access to e-learning content for self-paced learning;<\/li>\n<li>Organize workshops, seminars or courses in small groups for all your employees to encourage interaction and question-and-answer sessions.<\/li>\n<\/ul>\n<p>  The following concepts, among others, are covered:  <\/p>\n<ul>\n<li>Stakes, risks, costs, concrete examples;<\/li>\n<li>Risk assessment;<\/li>\n<li>Governance information;<\/li>\n<li>Business continuity;<\/li>\n<li>Safety policy and charter;<\/li>\n<li>Identification, prevention and crisis management scenarios.<\/li>\n<\/ul>\n<h2><strong>More information<\/strong><\/h2>\n<p><del>&#8211; Discover all Cyber Risk Clinic packages<\/del>  &#8211; A look back at the <a href=\"https:\/\/www.loyco.ch\/en\/actualites\/la-cyber-risk-clinic-ouvre-ses-portesthe-cyber-risk-clinic-opens-its-doors\/\" target=\"_blank\" rel=\"noopener\">launch of the Cyber Risk Clinic-<\/a><del>Cyber Risk Clinic website<\/del>  Edit: Since 2024, Cyber Risk Clinic Services have been integrated into Loyco&#8217;s services.  <a href=\"https:\/\/www.loyco.ch\/en\/services\/cyber-risks\/\">See Cyber Risk Services.  <\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Your contact<\/strong><\/h2>\n<p>  Lionel Ducommun:  <a href=\"mailto:lducommun@loyco.ch\" target=\"_blank\" rel=\"noopener\">lducommun@loyco.ch<\/a> \/ +41 78 805 16 13<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following the launch of the Cyber Risk Clinic last May, we&#8217;re giving the floor to several cyber experts who are active in this new structure. In this series of &#8220;cyber news&#8221;, they decipher for you the issues linked to these particular risks, and share concrete cases of cyber-attacks encountered in their professional practice. For the [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9694,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[44,104,52],"tags":[],"class_list":["post-7638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insurances","category-loyco-en","category-risk-management"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/posts\/7638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/comments?post=7638"}],"version-history":[{"count":0,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/posts\/7638\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/media\/9694"}],"wp:attachment":[{"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/media?parent=7638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/categories?post=7638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.loyco.ch\/en\/wp-json\/wp\/v2\/tags?post=7638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}