Announcing OneBeacon Entertainment & Take1 Insurance Partnership
OneBeacon Entertainment is pleased to share the news of its partnership with Take1 Insurance, a premier industry leader in the Entertainment market.
OneBeacon Entertainment is pleased to share the news of its partnership with Take1 Insurance, a premier industry leader in the Entertainment market.
We’re pleased to welcome two new members to our Technology team—David Chavez and Jason Gitlitz.
David joins us as our Information Technology Solutions™ (ITS) Product Manager, bringing more than 25 years of experience to the team. Based out of San Francisco, David is an Attorney by trade, specializing in cyber-related issues for small and mid-size companies. David has managed data breach response efforts, co-written a leading cyber policy, and underwritten scores of technology accounts. Prior to joining OneBeacon, David held senior roles at Berkley Life Sciences and Hiscox. David can be reached at dchavez@onebeacon.com.
Jason joins our New England regional technology underwriting team, based out of Boston. With experience as both an agent and an underwriter, Jason brings well-rounded capabilities to the team. Prior to joining OneBeacon, Jason was an underwriter at CNA in their healthcare facilities unit. Jason can be reached at jgitlitz@onebeacon.com.
Welcome to OneBeacon, David and Jason!
Reliance on cloud services has increased in conjunction with the recent shift to remote work, education, and healthcare. Cloud computing allows data to be stored and accessed via the Internet rather than on a local computer. Use of cloud collaboration apps such as Zoom, Webex, and Microsoft Teams, has grown dramatically. As a result., application-based attacks are becoming more prevalent as society pivots to these virtual tools. Capabilities inherent in applications are being used to gain unauthorized access to people’s data.
This societal shift to a greater online presence has compelled hackers to leverage application-based attacks to obtain access to valuable data stored in the cloud. Apps are being built to integrate account and organizational data from cloud platforms to enhance the online experience. The vast amount of information stored in the cloud is a lucrative target for cyber criminals. Consent phishing is an emerging tactic meant to trick people into granting a malicious app access to sensitive data stored in the cloud.
A recent Microsoft Security Blog outlined the basic steps of an attack, demonstrating the evolving and sophisticated methods cyber criminals are using in their quests to steal your valuable data. The steps include:
Security Best Practices to Avoid Consent Phishing
As the saying goes, “the only constant is change.” Cyber criminals are constantly adapting and changing tactics to take advantage of current events and find vulnerabilities in our systems. Here are some developments we are watching closely:
Termination Phishing Emails: A recent FBI (Federal Bureau of Investigation) Private Industry Notification warned that cyber criminals were taking advantage of the COVID-19 pandemic to target teleworking employees through fake termination phishing emails and VTC (Video Tele-Conference) meeting invites. The bad actors are using spoofed or typosquatted email domains to impersonate Human Resources or management. The emails lure victims to click on malicious links for additional information or online conferences about termination or severance packages.
Voting Campaigns to Spreads Malware: Cybercriminals are also leveraging current emotionally-charged social issues to entice you to click on links you might not otherwise look at. A recent article reported that an email phishing campaign requesting people vote anonymously about current race-related matters was spreading information-stealing malware. In general you should be wary of any surveys you receive.
Security Best Practices to Avoid Threats
A recent FBI Public Service Announcement warns of mobile banking cyber attacks. According to the advisory, there has been a 50% increase in mobile banking use since the beginning of 2020 due in part to increased time spent at home. Additionally, they report U.S. technology providers estimate more than 75% of Americans used some form of mobile banking in 2019. The FBI issued the following tips:
If a banking app appears suspicious, contact the bank via the customer service number posted on their website. The bank may ask for a banking PIN but will never ask for username and password over the phone.
A recent Krebs on Security Blog warned that not turning on MFA makes accounts vulnerable to exploitation by cyber criminals. Increasingly, bad actors are enabling MFA options and attaching them to devices they control making it much more difficult to regain access when an account is hacked. This risk increases for people who habitually reuse or recycle passwords on multiple accounts. It also cautions that many online sites and services are completely automated and difficult to reach for help when account takeovers occur. This is especially challenging if attackers modify and/or remove the original email address associated with the account. Any MFA option is better than relying on a password alone, but it is best to use the strongest option available such as biometrics, hardware tokens, or authentication apps. For a list of MFA options offered by popular websites, visit twofactorauth.org.
The idea of being effortlessly chauffeured by self-driving cars or autonomous vehicles (AV), has been a dream of futurists for several decades. They envision a time where businesses and consumers will use the technology to transport goods and people alike.
We’re pleased to share our latest whitepaper titled, “Autonomous Vehicles: Why Drive When the Vehicle Drives You” authored by OneBeacon’s Tushar Nandwana. In this whitepaper, he provides an overview of the history of Autonomous Vehicle development, pros and cons of the technology as well as considerations for the future of the market.
More whitepapers can be found at onebeacontech.com/whitepapers.