Merlin Labs Memo -- Week of May 15-19

Merlin Labs Memo -- Week of May 15-19

Open umbrella on the ground in front of a background of 1s and 0s

Famous Insurance Market Drops Coverage for State-Sponsored Cyber Attack Damages

Lloyd’s of London, one of the most famous insurance markets, has made the decision to put protections in place to stop coverage of damages caused by state-sponsored cyberattacks. Quoting a study putting ransomware payments in the ballpark of $457 million in 2022, the article reminds readers of just how expensive cyberattacks are. An increasing amount of the infrastructure supporting our day-to-day lives is dependent on IT, making the effects of a successful breach potentially catastrophic to the insurance industry. Further, there continues to be a widespread failure of organizations to take the steps necessary to mitigate the risk of adversarial threat actors. While breaches will happen, a huge number of those breaches could have been stopped altogether or their impacts severely limited had the victim organizations simply practiced good cyber hygiene. Business leaders and CIOs everywhere should see Lloyd’s decision as motivation to invest more heavily in their cybersecurity operations. -- Via Infosecurity Magazine

Our Take: This is the kind of wake-up call nobody wants but we all apparently need. When the insurance industry stops covering certain types of damages, it’s because the likelihood of a financially insurmountable event is so high that they simply cannot take the chance. Translation: we’ve collectively allowed ourselves to negligently operate and blindly trust IT systems for every facet of our daily lives without appropriate regard for the degree of risk or the cost of a “highly likely” cyber disaster headed our way. We live in denial that it will happen to us despite the overwhelming evidence reflected in daily “latest cyber breach” headlines. Lloyd’s just told us that it very likely WILL happen to us. Are we listening yet?

Whether Lloyd’s decision is an isolated case or the first of many-to-come, the message is clear: it’s past time to embrace the threat landscape and the criticality of proactive cybersecurity mitigations. And because this story presents an overwhelming conundrum, I'll borrow some wisdom from Winston Churchill and say: when looking at the massive cybersecurity improvement task in front of you, don’t let perfection be the enemy of progress. For starters:

  • Identify and reinforce protective controls (limited access, FIPS encryption) around the most critical data and system functions and build from there
  • Patch the highest-priority vulnerabilities
  • Establish a process for backup and recovery of critical systems
  • Clean up and cinch in user accounts and role-based access
  • Turn on encryption and run software in FIPS mode wherever possible
  • Reconsider requirements around multi-factor authentication (MFA)
  • One by one, re-visit the security tools in your stack and make sure they are implemented and configured based on the industry and manufacturer’s best practices.

Before you know it, you will have significantly improved your cybersecurity posture and be well on your way to a much healthier and hacker-resistant IT operation. A full-on resilient, phishing-resistant, anti-ransomware, least-privilege, zero trust architecture doesn’t happen in a day; rather it happens by making sure every day involves taking a few steps in the right cybersecure direction. -- Sarah Hensley

Additional Reading:


digital silhouette of a human-like face in front of a digital background

Phishing 2.0: Enter the Deepfakes

I just completed my annual security training. It included tips on how to spot phishing emails – look for the spelling mistakes, the bad grammar, things like that. And those are still sound signs of a human-generated phishing email. Now imagine the same attacker using AI tools to fix those grammar and spelling mistakes and we’re deprived of two major sniff tests for detecting phishing. Worse, with just a few seconds of a voice sample, AI-generated voice scams can sound exactly like someone else that you may know. Sure, there are odd pauses and vague answers now, but we all know the inexorable march of technology will mean that those issues will be engineered out eventually. What do we do to protect ourselves? 

Our Take: Fortunately, my phishing training gave me other tools, and these will be our salvation. Even if the Caller ID looks right or the reply-to email adds up, when we get unusual requests involving urgency, money, and/or elevated access requests, we need to ask questions. We need answers that an AI trawling publicly available information correlated to ourselves and the person contacting us won’t have access to. If we get a call from a loved one or business associate, offer to call them back. Chances are, the AI on the phone would reject that offer but a real person would accept it as a sadly necessary security protocol. 

We have legitimate worries about propaganda deepfakes – social engineering for the masses – but we also need concern about the one-on-one, data-driven social engineering that AI makes possible like never before. -- Dean Webb

Additional Reading:

Readers of our Newsletter: What’s working, what’s not, and what’s on your mind? Leave a comment below or email [email protected]. Thank you!  

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics