Cyber attack- take action!
The views and opinions expressed here are solely those of the original author or contributor. These views and opinions do not necessarily represent those of the UK P&I Club.
Last week saw the UK Parliament hit by a 'sustained' cyber-attack, which centred on identifying weak passwords and exploiting them. This in addition to the recent ransomware attack on several NHS trusts, causing problems in many hospitals in England, highlights how easily seemingly secure systems can be hacked.
But most cyberattacks aren't even this complex - many of them, are simple phishing emails whereby the hacker inserts him or herself into an email chain, watching for an opportune moment and intervening, usually to redirect large quantities of cash. The Club's in-house investigators, Signum Services, were recently involved in such a case.
Cybercrime is on the up, the Office of National Statistics estimated that in 2015-2016 there were 2.46 million cyber related crimes. This figure is expected to rise.
There are some active steps Members can take to reduce their cyber risks:
Educating staff about cyber fraud and how it can occur.
Be aware that this is an ongoing risk - so be vigilant and avoid complacency e.g. if someone contradicts payment instructions probe further.
Protecting your systems. Ensure your computer software is up to date and you have adequate malware protection.
Consider conducting a risk assessment of your computer systems and process to help identify any weak spots.
Further information is available on the Club's Cyber Security page.
You may also be interested in:
World Suicide Prevention Day
World Suicide Prevention Day is an important annual event to raise awareness of suicide
Maritime Cyber Risk
The International Maritime Organization is requiring Shipowners and Managers to include cyber security management procedures in their Safety Management System by 2021
The International Maritime Organization (IMO) adopted Resolution MSC.428(98) Maritime Cyber Risk Management in Safety Management Systems on 16 June, 2017
In Part I of this article, the authors introduced the three new eBL providers whose blockchain based systems were recently approved by the International Group (IG), and provided an overview on how their systems work. Here in Part II, we take a look at the recent products and initiatives of Bolero and essDOCS, two of the first generation eBL providers. We also take a look at cyber risks again and at whether the paper BL, as a tool, is still fit for purpose in today's international trade.