The Coalition Cybersecurity Checklist: Protect your business in the new year

Everyoneâs life felt a tectonic shift in 2020, and the rapid evolution of our work and home lives has led to a rise in cyber crime. Effectively protecting your organization from today's cyber threats can feel like a daunting task, but itâs more important now than ever before.
Here at Coalition, we have a unique, up-close view of the cyber attacks that impact organizations most. Unfortunately, weâve seen the severity, frequency, and sophistication of these attacks increase dramatically over the last year.
From 2019 to 2020, we saw a 67% increase in the frequency of business email compromise attacks. In the first half of 2020 alone, we witnessed a 47% increase in the average ransom demand. And while many attackers exploit misconfigured security settings and software vulnerabilities, 60% of claims we saw resulted from human error.
Coalitionâs Cybersecurity Checklist
Instead of letting these stats shake your confidence, we want you to feel empowered to take action and do what it takes to shield your business from malicious actors. In partnership with our in-house Security and Incident Response (SIRT) and Claims teams, weâve identified a few simple (free and low cost) steps you can take today to protect your business.
Coalitionâs Cybersecurity Checklist summarizes our top recommendations for small businesses who want to be safe and secure. If you check off every item on this list, youâll be a much less appealing target for cybercriminals in the new year and beyond.
This checklist can help you avoid cyber attacks
Is this checklist for you?
| Cyber Incident | Description |
|--------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
| Ransomware and malware attacks | A bad actor encrypts and disables access to business-critical systems and data until a ransom payment is made. Data may also be exfiltrated and exposed if the ransom isnât paid |
| Funds transfer fraud | A bad actor uses social engineering, sometimes in concert with attacks such as phishing, to cause funds to be sent to the attacker instead of the proper recipient |
| Business email compromise | Email intrusion resulting from spoofing, phishing, or spear phishing that can result in a data breach or funds transfer loss |
| Data breaches | Exposure of Personally Identifiable Information (PII) or Protected/Personal Health Information (PHI) of your customers |
| Legal and regulatory issues | Violation of a legal or regulatory framework, such as GDPR or CCPA |
| Web application compromise | Direct compromise of a web-based product, such as an ecommerce platform, as a result of a targeted attack |
| Technology errors & omissions | A failure in the technology product or services results in business interruption or loss on behalf of your customers |
This checklist was built for small businesses looking for expert advice to protect their organization from a devastating cyber event. Small businesses often donât have the security and technical expertise of larger organizations, making them a prime target for attackers. Coalition understands these challenges, which is why we are sharing the suggestions of our cybersecurity specialists with you.
Note:Â
Addressing these security areas will help you mitigate cyber risk, but they canât guarantee you wonât be a target. If youâre looking for more detailed cybersecurity advice, reach out to our team, and they will be happy to assist.
Download the Coalition Cybersecurity Checklist
With this checklist, youâll be able to quickly view the safety measures you need to implement to secure your organization and minimize your chances of experiencing a cyber incident. Pass this helpful checklist off to teammates and security provider to make sure youâre secure.
If you have any questions or would like to discuss any of the items on the checklist, feel free to reach out to our team â weâre here to help.
For more detailed explanations of each section of this checklist, including vetted vendor recommendations, download the 2021 Coalition Cybersecurity Guide.