MFAs, Data Encryption & Endpoint Detection Response

Home

Mitch Bernier joins Paul Martin and Colin Rooke again to continue the conversation on cybersecurity.

Listen to the full episode here, or read the full transcript below.

Paul Martin:

Welcome to Risky Business, commercial insurance with Butler Byers. This is Paul Martin, the business commentator on CKLM, and the host of this program. Joining us, as always, Colin Rooke, the commercial risk reduction specialist with Butler Byers.

We also have joining us, Mitch Bernier, who is a partner in Professional Computer Services. Mitch, we had you on here on the last episode and you and Colin were exchanging some absolutely critical information that business owners and those responsible for business operations are going to have to become conversant with. Actually, we ran out of time, so we decided we better just keep this topic going, because there’s too much here to brush over it too quickly. This is rapidly becoming, Colin, maybe you can jump in here from the insurance industry’s perspective. This topic is really being elevated rapidly in the minds of importance. The rank of importance in the minds of the insurance companies, isn’t it?

Colin Rooke:

Yeah, it is. We brought up three topics in the last show, multi-factor authentication or MFA, we brought up endpoint detection and response, and we brought up data encryption, so everything’s at rest and in transit, including email. We talked quite a bit about multi-factor authentication. We ran out of time, but it’s critical that we, I’m going to even say warn business owners out there, that if you don’t have or you don’t know what endpoint detection response is, and if you’re unaware of data encryption, especially depending on what industry you’re in, one, you need to know about it, you need to know why you would do it, the risks of not doing it. And then I guess a warning from myself that it’s going to be a requirement soon. For a lot of industries, it is each year more and more.

So rather than wait until your broker or your cyber insurer requires you to do this, understand what it is today, and formulate a plan and get your business up to speed, or up to best practices now, because one thing I can say about the cyber insurers and specifically cyber insurance, they’re not going to give you nine month lead time when they require something at renewal. You’re going to learn one month, maybe two out, and often it’s a race to get it done and most can’t complete that in time. And now you’ve got a big issue.

 

Paul Martin:

All right. That’s why we brought Mitch back in because he is the keeper of all the knowledge on this topic. Mitch, you deal with business owners, with general managers, people responsible for IT in businesses around the province on a daily basis. How are they reacting to this? What are you hearing back? Is it just one where, “Man, I don’t know if I can keep up to this, my eyes are glazing over?” Just how are they coping with it? What are you seeing? What are you hearing?

Mitch Bernier:

Hey Paul, Colin. Thanks for bringing me back here. Yeah, after our last episode aired, I have a few people that were emailing or texting out back to me saying, some of it was simple like, “Hey Mitch, we heard you on the radio. Thanks for bringing that up,” and, “Am I protected? Because I don’t really know, but can you tell me?” For the most part, most of them are, they’re in decent shape, but there’s always something that you can make better.

On the odd, there is the odd one that it’s like, “Nope, we talked about this a few months ago with you and you didn’t do anything,” but it might have been summer holidays. And now they’re looking at, “Okay, now we hear this, we think it’s serious, we should do that. Help us out.” It’s been a good positive change that way. Now after, as Colin talked about there, the different insurance providers that are asking different questions, especially in cyber, those questionnaires are getting way more precise with terminology and exactly what they want. So if we want to talk about the data encryption piece, is that where we’re going to start?

Colin Rooke:

Yeah, either, or. If you want to talk about endpoint detection or encryption, the mic is yours.

Mitch Bernier:

Okay. Okay, well let’s start a little bit about data encryption. I think it’s important to understand what is it? What does it really mean when people talk about data encryption? It’s a form, a way to transform data from readable to non-readable. Easy as that. And then if you want to read it again, you need a decryption key. If you have the key, it’s presented as readable.

Now that can apply to your emails, to your Word documents, your home recipes, put it on anything you want, but break it down as simple as that. Most people, most business owners or most employees in the company wouldn’t be able to tell you if I asked them, “Is your database encrypted?” They would have no idea about that. That’s more looking at the IT department, the IT guy, something like that to reach on.

In the cyber insurance forms that we’ve filled out over the last couple years, what started off was it might be a question of, do you encrypt your data? But now those questions are way more precise is, if you are running a database, is your database encrypted? They are really targeting any personal information. So if I look at Colin and Butler Byers, I can only assume an insurance company gathers names, dates, addresses, stuff like that, that’s personal information, and now he’s obligated to protect it. The way to do this is through encryption, through using technical methods on keeping that data safe and doing all he can to do that. Colin, you had used a couple other words about data in transit or data at rest?

Colin Rooke:

Yeah, so I’m not an expert in the how, but what I find where businesses get hung up on, they seem to be okay or call it, it seems to be easier to do the stored data, but when we say email as well, so in transit, that seems to be the big project or the, “Ugh, this is going to take some time.” Again, I understand what encryption is, I understand why these cyber insurance market wants you to have it, but what is the challenge there specific to email? Why does it seem like a project to implement?

Mitch Bernier:

Right. Okay, well, when people think email, you’re communication. It’s a communication tool that you and I are sending data back and forth, and not if it’s like, “Hey honey, bring home milk tonight,” not really super sensitive, but there is probably information that you might send to another business, to an insurance provider, that is sensitive and you want to ensure that it’s not readable by anyone else. In Outlook, there’s a button in my Outlook that says encrypt and I have a few encryption options there, but it’s as simple as that. That is, if email was going from me to you, Colin, that’s data in transit and that’s where I want to encrypt that message.

Another example of that would be if I’m doing my online banking, and now the bank and I are having an interaction here and I am looking at my bank account, I necessarily don’t want people seeing that. That’s where you see when I go to the bank website, there’s that little lock icon right by the www dot address and it’s telling me that this is encrypted.

Paul Martin:

I’m going to jump in just for a second, just because I’m trying to manage our time here gentlemen, and we do have to take a little bit of a break. But I want to just touch on one further aspect of this. We generally look at this in this context in this program around the issues related to insurance, but there are also some legal issues here too in terms of data breaches and this kind of stuff. There’s protocols and laws that we have to be looking at as well that go, I guess that’s why you buy insurance against it, but there also is the legal implications and legal liability that goes with it. So maybe we can pick that up after we take a short break. You’re listening to Risky Business, commercial insurance with Butler Byers. I’m Paul Martin, we’ll be back after this.

Welcome back to Risky Business, commercial insurance with Butler Byers. Paul Martin here, and joining us today, Colin Rooke, the commercial risk reduction specialist with Butler Byers, and Mitch Bernier, partner in Professional Computer Services in Saskatoon, and our expert on all things related to cybersecurity.

Just before the break I was talking about, yes, there’s insurance stuff here, but there’s also legal stuff too. So it’s a double-layered thing. Colin, do you have a perspective on that? Do you end up talking to lawyers on these kinds of things?

Colin Rooke:

Yeah, we do. You referenced the Privacy Act quite often. Really, if we have a client that has a claim, it’s not just as simple as, “We’ll get working with your adjuster and we’ll look for any first party damages that may have occurred and work on reimbursement.” There’s often third party damages that you need to consider.

There’s also regulatory issues and requirement from our clients by way of 24 hour help desk, credit monitoring, that sort of thing, to ultimately protect the public. So it really is a good topic, and I always warn our clients that the first party damages are the least of your concerns. It’s always the, what are the risks to everyone else? And if you talk about reputation risk, reputation, and then working on reputation repair, it’s going to come, again, from third party damages and any regulatory penalties, rulings, that kind of thing. So, yeah, it really is an important topic to cover that it’s not just about insurance, it’s about everything else.

Paul Martin:

Well, I raised that only to reinforce the message that’s underlying this program is, business people, this is important. This has many implications for your enterprise. Mitch, I’m wondering if you get people to say, “Well, I guess it’d be a nice to have, but is it a must to have now?”

Mitch Bernier:

Yeah, very much. In the last few years most companies that we deal with, that business owner would come to us and ask, at least ask about it. So that’s probably an insurance provider that’s approaching them saying, “Hey, protect your business. This is what to look at. This is important.” And then they might not understand the questions on the form, but they would come to somebody like me to say, “Hey Mitch, how are we? Are we in good shape? Do I comply? Is this going to cost a bunch of money? Is this going to take a bunch of time?” Like some of those considerations for the owner.

Colin Rooke:

So, speaking of compliance, let’s talk about endpoint detection and response. That seems to be the new kid on the block, at least for us. We’re hearing about it all the time. Data encryption has been talked about for a while and it just seems to be showing up everywhere, back to the forms you’re seeing, it usually is the supplementary questions that are asked. So, again, what is it? Why do I need it? How do I get it? Why is the insurance market concerned with it?

Mitch Bernier:

Right. Okay. So endpoint detection and response, EDR, is, think of it like, back in the day everyone needed antivirus and that was the thing, and that was probably a question on an insurance form back in the day, do you run antivirus? Well, now there’s just so much more to it than that. Really it comes down to how technology has evolved, where they can be looking at your endpoint, and endpoint meaning desktop computer, laptop computer, your iPad, your smartphone, wherever you put this agent on, in real time they’re watching… not watching what you’re doing, that’s the wrong term. They are analyzing what your computer is doing.

If it’s something like the old school virus, they might throw an alert on your screen saying, “Hey, there’s something going on. Maybe don’t click on this or follow it.” But there also might be some analytics in the background looking at that transaction that your computer’s trying to do saying, “Hey, this looks pretty fishy. We’re going to stop this now and not let you proceed, because we think something bad is going to happen if you do that next step.” The evolution now in the EDR market is a managed threat response, where if you’re doing something bad on your laptop and the user might not know something bad is happening, but there’s a team, an alert generated outside to a third party, and that team will look in real time at what’s going on and take action.

In some of our clients nowadays, you can subscribe to some different models, because Butler Byers might be getting attacked at four in the morning and I’m in bed, or your IT person’s in bed, and not necessarily looking at something happening, but that team that’s running 24/7, they will take action or you can grant them permission to deny any, turn off the internet, do whatever it takes to prevent something negative from happening to a business.

Now of course it comes down to budget because these security companies do charge for this, but there is lots of value there depending on what line of business you are in.

 

Paul Martin:

Mitch, is there any differentiation between big business and small business in this? Or as long as you’re in business you could be facing a threat?

Mitch Bernier:

I would say anyone’s at risk. When you hear of some of the ransomware attacks or some of these attacks nowadays that happen, it’s some small business, some large business, and the bad guys, those threat actors, they are good at what they do. When they come up with a scheme on how to attack a site or get into it, they’re efficient at it. They’re not just doing necessarily only one. They might do a thousand of them today. They only need to get into one.

Colin Rooke:

I can concur too. There really doesn’t seem to be a rhyme or reason or any pattern you can follow as to who has the breach. One, it’s random, and seemingly rampant.

Mitch Bernier:

Yeah. They find a weakness and they exploit it. If the weakness is technology, we need to correct that. Or the weakness might be your employee, your human sitting there, so we need to educate them and bring them up to speed.

Paul Martin:

Yeah, I guess I’m asking, there’s no protection then for being small and thinking, well, I’m too small a fish for them to bother? There’s nothing here to bother pursuing?

Mitch Bernier:

No.

Paul Martin:

No, that doesn’t matter at all?

Mitch Bernier:

No. Usually that comes down to money, budget, where some of the large organizations can afford to do those third party security firms to monitor things 24/7, and the small ma and pa shop, they can’t afford that fancy stuff. So you invest in a good EDR solution or something like that and it’s doing its best job for you.

Paul Martin:

I guess the argument could be the reverse, is that the small business is likely more of a target because they’re less equipped to prevent it.

Colin Rooke:

Yeah.

Mitch Bernier:

Yeah. That’s right.

Paul Martin:

Just one other question on this, Mitch. Just in listening to the conversation here as you lay it out, back then we only needed to have antivirus. Now it’s become more sophisticated. I take from that that this is an ever evolving situation, that the bad guys are always learning new stuff and we always have to put new stuff in to protect ourselves. Is that a fair or accurate assessment?

Mitch Bernier:

Yeah. Oh, that’s exactly right. It’s you, we need to be perfect every time. They only need to get something right once and they’re doing their thing. But on the defensive side, you need to be right every time.

Paul Martin:

Yeah, and this isn’t just one fix solves it for the rest of eternity. This is something business owners need to be on top of. Just another thing that you have to deal with on an ongoing basis, and it needs to be put into your systems so that it’s constantly being brought up to the top of your to-do list.

Mitch Bernier:

Yep, exactly.

Paul Martin:

All right, Colin, we’ve got maybe a half a minute left. Do you want to offer what Butler Byers brings to this table too? If I’m a business owner, I call you up, how are you going to help me with this?

Colin Rooke:

Yeah, I just think it’s important to have experts like Mitch Bernier from Professional Computer Services on the show to point out that this is part of our system, this is what we do. So when we’re going through the risk reduction workshops and talking about level of protection, if we’re talking about cyber, for example, and formulating that plan, well then we say, “Okay, we’re not going to implement endpoint detection in response, but here’s someone that can.” But they also, they understand the cyber market, they understand what’s going on and they’re thinking proactive. So it’s part of what we do in the identification, and then we will also play a part in connecting with the experts.

Paul Martin:

Colin, as always, very insightful, thank you very much. Mitch, I want to thank you for joining us a second time. Your insights are invaluable. Thank you for that.

You’ve been listening to Risky Business, commercial insurance with Butler Byers. I’m Paul Martin. Thanks for joining us. Talk to you next time.

Rapidly evolving cyber crime & cyber security

Home

Mitch Bernier joins Paul Martin and Colin Rooke to discuss the rapidly changing nature of cyber crime and cyber security.

Listen to the full episode here, or read the full transcript below.

Paul Martin:

Welcome to Risky Business Commercial Insurance with Butler Buyers. This is Paul Martin, the business commentator on CKOM. Joining me today, as always, our resident expert, Colin Rooke, the commercial risk reduction specialist at Butler Buyers. And Colin, I like to call you an expert on insurance, but today we brought in a real expert because we’re going to talk about some technical stuff. And I want to welcome Mitch Bernier, partner with Professional Computer Services.

And we’re back to one of those topics that we have touched on fairly frequently over the last few years, and that is cyber, cybersecurity, cyber attacks, all of that sort of genre of activity that business people are faced with. And I’m wondering, we haven’t talked about it for about probably 3, 4, 5 months and I’m guessing everything else in the world, this one is evolving and that even three months ago, the story we would’ve been talking about is different than the story we’re going to be talking about today. Is that a fair assessment?

Colin Rooke:

Yeah, it is. We certainly keep coming back to the topic of cyber crime, and it’s just because it evolves so rapidly, something that we would have discussed as a new issue or sort of a must-have from a cybersecurity perspective, certainly three to six months ago, you look at today, and those best practices are no longer sort of the best but considered to be sort normal and required. And so I think it’s important just to keep touching on the topic and to make sure the audience is staying relevant.

I think I do a pretty good job of explaining the nature of the risk, the frequency and severity of claims in the industry, where it’s going, why pricing is so high, what you can do about it, and talking about overall, the nature. But I wanted to bring Mitch in to talk about… Okay, we’ve talked about topics like data encryption, we’ve talked about multi-factor authentication, we’ve talked about endpoint detection and response. I just throw those words out there saying, these are some of the things that we’re seeing that we used to say it would be nice to have. And then I think you’re going to need it soon, and now you must have it.

And so I thought rather than talk more about the claims we’re seeing or the list that we get from the underwriters to bring someone on that can actually say, okay, well what is it? Why would a cyber insurer be concerned if you didn’t have it? What does it do and how can you get this? And so I thought, why not bring Mitch on, again, partner with professional computer services, he can explain these topics and then our audience now knows, well, here’s what we can do. And bringing experts like this would be all part of the risk reduction work we do. So we go through the assessment, we identify gaps, and then we would connect our clients with a third party that can help if we aren’t able to do it in-house.

Paul Martin:

All right. Well, Mitch, welcome to the program and look forward to your insights on this. And Colin used a lot of buzz words, end-to-end data encryption. I mean, I wake up in the morning and think, “Oh, if only I could deal with that today.” But I’m sure business people feel a little overwhelmed with this saying, the volume of things that they have to deal with now from a regulatory to this sort of protective side of thing, when business people come to you, Mitch, I mean, are they a little bit perplexed, a little bit baffled, how do you guide them through this and how do you bring the temperature down a little bit on this conversation?

Mitch Bernier:

Right. Yeah, Paul, good morning guys, and good to see you here this morning or talk to you this morning. I think this is very much on business people’s minds, like the owner’s minds now. Like you said, when you wake up in the morning and what’s bugging you. And lately, one of the big topics, and it kind of I’ll say started through COVID. There was a very big uptick on cyber attacks, cyber crime. And we keep hearing these stories in the media about some large enterprises that get compromised or even down to your neighbor’s small business that gets attacked and compromised. They fall for something, they get tricked for something, they get ransomwared, cryptowared, all these names.

And now even in Saskatoon, since in my geography, I tend to deal with more small business than large enterprise and I have a lot of owners coming back to me now with a two or three-paged PDF from an insurance company saying, “Hey Mich, can you help me fill this out?” And I guess I’ve always done those steps with these people because it’s a lot of the geeky type questions that they’re just not going to be able to answer. But over the last year, I probably start filling out two or three of these a month now to try and help people through their things and identify the gaps. And a lot of times they say, well, what’s this about? Why do I need this?

And at first it started with, “Hey, Mich, my insurance guy, he’s trying to sell me this cyber insurance stuff. Do I need it, or do you have me protected?” And now it’s more a conversation of, “Hey Mich, I want cyber insurance now. Not do I need it, but now I want it. What do I got to do to comply?” And in the last year in filling out these forms, the forms are getting a lot more specific on what they require for a business to comply. And there’s a few key things as the buzzwords that Colin mentioned there. MFA is such a huge thing now. Encryption, a big word and it means a lot in a lot of different spaces. The endpoint detection, EDR or MRT or MTR, managed threat response.

Some of these things now are becoming so prevalent in our cybersecurity world. It’s almost mandatory to have these pieces in place now. Just like when the internet came out of 20 years ago and everyone needed a firewall, that was the one piece to keep you secure. And now it’s so much more than that. Now our world is so connected, the introduction of everything cloud-based. And now your resources aren’t necessarily in your four brick walls downtown. They’re scattered throughout the cyber universe. How do you protect it all?

Paul Martin:

I guess we know we’ve reached a level of maturity when we have our own set of acronyms and initials for something like this. And I noticed you were first struggling with the number of initials that are out there, and you got to feel a little bit sorry for the business owner or the CFO responsible for placing insurance to be able to keep up to all of this stuff. And Colin, I’m wondering, do you get pushback from prospective clients or your client base, or how are they reacting to this just with some kind of resignation, or are they indignant about it?

Colin Rooke:

Yeah, so Mitch made a very good point when it comes to the application itself. So, the application is full of terms. I mean, absolutely full of terms. And unless you’re dealing with someone like Mitch on the other end, we’re asking a CFO as an example to confirm is this in place, is that not in place. And it’s tough to keep up. And we certainly get applications back where some of these boxes are ticked, and it takes a couple of questions from our end to realize, no, they’re not.

And so there was some confusion. You’re not quite sure what multi-factor is like. We’ll get organizations that’ll say, well, we have login passwords. Well, that’s not what we’re talking about. And so I think step one, especially due to the complexity and the nature of the risk and the insurance application itself, I think it’s very important to reach out to someone like Mitch from Professional Computer services and say, “I might know what I’m doing, but I don’t want to be wrong on this. Can you walk me through how to fill this out because I certainly don’t want to say yes to something that we don’t have in place?”

Because from our chair, if you say yes, but you have it and don’t, there’s a breach, there’s not going to be coverage. And that’s a big deal. And so I think step one is talking to someone to walk you through it. But Mitch, we talked about a few of the acronyms. Why don’t we start with MFA, multi-factor authentication, and just kind of quickly explain what it is, what it does, how do you get it, and why the insurance companies would care?

Paul Martin:

Yeah, and I’m going to jump in. We have to take a little break, and I was thinking right after the break, Mitch, if you’re good with that, we’re going to come back and kind of walk through some of these more technical terms and just get your insights so that business people, business owners and managers can actually get their head around this. And this becomes less of a fear factor, more of a “Oh, I understand that and I know why we’re doing it.”

You’re listening to Risky Business Commercial Insurance with Butler Buyers. I’m Paul Martin. We’ll be back after this.

Welcome back to Risky Business Commercial Insurance with Butler Buyers. Paul Martin, your host here, and joining me, Colin Rooke, the commercial risk reduction specialist at Butler Buyers, and Mitch Bernier, partner with Professional Computer Services. And we’re just getting into some of the terminology that is… I’m guessing going to become part of the average everyday business person’s lexicon as we go forward. And Mitch, maybe just walk us through that. And let’s start first with that multi-factor authentication thing that we’re talking about prior to the break.

Mitch Bernier:

I think multi-factor authentication is probably the single most important piece to ensure everyone is running nowadays. On top of strong passwords and a firewall and stuff, it’s the latest thing on a way to protect yourself. I think in most small business in their Office 365 tenant, there’s some easy check boxes or easy clicks to enforce your staff to help them to enable this thing. Back in the day, we relied on one password as that single password. And I think that’s where the multi-factor, it started with two-factor authentication where people realized, if that password gets compromised, is there another step that we can take to protect ourselves? While now, people or businesses are looking to multiple ways to protect those layers to get into your organization to get to data. So, it kind of evolved into the term multi-factor authentication. So usually, the first step in MFA is something you know is your password; is the most common thing.

For years and years now, we’ve been stressing to people have a good strong password, uppercase, numbers, symbols, stuff like that, come up with a phrase, something that’s not guessable, not in the dictionary. The next evolution in there now is in the MFA world, something you have. So for most people now, it’s a smartphone. So the next layer to authenticate is… And a lot of people will see this from their bank accounts nowadays, where it’ll text you a code and you got enter in the code and then I can gain access to my bank account or the banking website.

In the Microsoft world, it’s to gain access into that Office web app or into my Outlook, into SharePoint data. Another option is the fobs that you see. Every now and then, somebody will see it on their key chain or something, and it’s a code that’s changing every one minute. You can install that same type fob as an authenticator app on your smartphone. And in our world here, we tend to push that authenticator app a little more than a text message. Nowadays it seems a little more common, where when you’re setting up the two-factor authentication steps, they’re asking you to scan this QR code and it’ll install into the authenticator app and start generating a new code every one minute for you to key.

Another type of authentication then, of course, is something that you are, meaning your fingerprint, your face, your palm, when they scan something bio on you that they can look at that’s unique to you as a human. My laptop, now when I sit down in front of it, there’s facial recognition, so my cameras tends to always be on, or I don’t cover the little slider switch. So it’s looking at me, and when it sees my face, it turns itself on and logs me in. Something like that.

I think in filling out all these insurance forms here lately, MFA is the one piece where you can really see it coming from any insurance provider now where it’s almost a black and white question of “Do you have this enabled? Yes or no?” And if you check the no box, then they always come back and say like “You’re declined. We’re not going to cover that one.” And then usually, the business owner comes back to say, “What do we got to do? How do we do this? Where do we go from here?” So you can walk them through the steps of getting that coverage or getting some type of MFA going, and then they can check the yes box. That make sense?

Colin Rooke:

Yes. Yeah, absolutely.

Mitch Bernier:

I think in the recent waves of attacks that we see now in the world, most, like 99% of them will be stopped if people have MFA enabled. If they receive a bad email and they click on that bad link and type in their password for their office account, the next check if the bad guy had your password now, it prompts them for that MFA authentication. So if you’re sitting there with your smartphone and you’re getting a prompt for, “Hey, do you want to allow this to happen?” And you’re thinking, “I didn’t ask for anything. I didn’t do anything.” The immediate button to hit there is “Deny the action.” Proceed if you don’t know.

And of course, as we’re talking about this, well, maybe a year or so ago, we went through an exercise where that was the case where somebody was annoyed with the button popping up on their phone saying “Do you want to approve?” And they said no. And eventually, they were annoyed by it, so they approved it. So even that level of protection, they just bypassed it by not thinking about it because they were getting attacked. They just didn’t realize it until it’s too late. And it comes down the human aspect there. They’re waiting for the human to make an error, make a mistake.

Colin Rooke:

I’m glad you said that because I often talk about that cyber crime is almost 100% human error. And it’s these types of situations where you’re explained what multi-factor is, that you’re going to get an alert on your phone if someone’s trying to log in, but then people being people, you see the prompt, you think something’s wrong with the program and you approve it, and now suddenly we have a breach. So I’m glad that you touched on that because it’s something that I often talk about; that’s why education’s so important and it’s so important to have regular talks about cyber crime and cyber liability because of instances like this that if your phone is telling you someone’s trying to log in and you aren’t, it is a problem. Don’t ignore it. Don’t just hit “Allow it to go away.” Tell someone like yourselves in IT to say, “I’m a little concerned.”

And I always say too, and I just ran into a situation yesterday that if your gut instinct is telling you not to do something, what has to do with your computer or your device, don’t do it. I mean, you’re not going to be reprimanded to say, “Hey, I was thinking about the company here. This seems a little suspicious. I don’t want to do anything that’s disruptive. What should I do here? Should I do something or leave it?”

Mitch Bernier:

Yeah, that’s right. It should raise an immediate red flag to the user. And most of it comes down to that user education, user training. A lot of people will say “I don’t understand IT. I don’t understand all this stuff. It’s too much.” But that’s where we do need to start training our staff, training the people on what this means, how it works, and what it means, what to do. And you’re never going to go wrong by asking questions or going to ask somebody, “Is this good or bad? Should I do this?” to keep the organization safe.

Colin Rooke:

Yeah, absolutely.

Paul Martin:

Colin, we’ve got maybe a half a minute left here. As you guys are discussing this, it just strikes me as training and plugging the staff into this stuff on a regular basis becomes one of the tools that business owners can use- regular training or updating sessions. And Colin, I wonder how the insurance industry views that. If a company seem to be proactive on this by spending time discussing it with staff, maybe having a Mitch come in and talk to the team, that I’m guessing is considered favourably.

Colin Rooke:

Yeah, absolutely. Again, part of the reservation with the insurance markets is, are we discussing cyber crime? Does the organization understand cyber liability? We get questions around it, and we don’t have time to touch on it today, but having an incident response plan, and part of that plan requires at minimum quarterly education or rereading the plan. And so these are all things that as we go, it’s going to… Of course, from a pricing standpoint, but frankly at this point, just the availability of coverage itself, that if you’re not putting in the effort, you’re going to find yourself without. And that’s the real concern. And so education is very important, and it’s important that we relay that back.

Paul Martin:

Gentlemen, we’ve run out of time. Thank you for this. The insights are really impressive on this. Mitch Bernier, partner with Professional Computer Services. Thanks for taking time to join us. You’ve been listening to Colin Rooke, commercial risk reduction specialist at Butler Buyers. This is Risky business. Thanks for joining us.

Mitch Bernier:

Thanks Guys.