“ While it ’ s true that cyber threats are growing in sophistication , most successful attacks are still accomplished by targeting human fallibility ”
JAMES NADAL PRODUCT SPECIALIST ,
OSIRIUM
“ The first step in stopping the theft or accidental exposure of privileged credentials is to ensure nobody has access rights they don ’ t need . There is always too much privilege – staff often retain access to systems they no longer require after leaving or changing roles .
“ Next , employees should only be granted the access they need to do their work , for the shortest possible time , and with the lowest level of privilege . Ideally , users should be separated from privileged log-ins altogether , using software that directly ‘ injects ’ them into systems . If nobody has access to a password , it can ’ t be leaked or misused .”
And EIS Group ’ s Rory Yates concurs : “ As we move to data ecosystem-based models , increased digitisation and further the data reach into other tools and experiences , data security will intensify with it .
“ From the right foundations , insurers can protect their core while making the data they already have far more valuable . From here , traceability and transparency improve .” insurtechdigital . com 111