Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Safeguarding your business against cybercrime

Greensboro, NC – On November 13, 2023, the Southern Jewelry News published an article on titled, “Protecting Your Business: Safeguarding against the growing threat of cybercrime.” The article is posted below:

Protecting Your Business: Safeguarding against the growing threat of cybercrime

November 13, 2023

With cyber losses nearly doubling from 2021 to 2022 and trends continuing upward, it�s important to stay educated on cybersecurity best practices to be able to easily identify threats and help prevent them from occurring in your business.

Image of laptop, phone, and tablet

Understanding Cybercrime

Cybercrime refers to any criminal activity in the digital realm, spanning internet-connected devices, networks, and even bank accounts. These attacks are often motivated by financial gain but can also include influencing elections and espionage.

Common Cyber Attacks

  • Phishing: Phishing emails trick individuals into sharing sensitive information, clicking on a malicious link, or downloading malware.
  • Ransomware: Ransomware attackers hold data hostage and demand payment in exchange for its release, usually perpetrated through malicious links in phishing emails but can also be delivered through unpatched devices.
  • Business Email Compromise (BEC): This occurs when a cybercriminal compromises an organization�s email system or individual account for the purpose of fraud. A common example of this is a compromised vendor email system sending an invoice with incorrect payment instructions.
  • Identity Theft: Identity theft occurs when a valid user�s credentials have been compromised, leading to unauthorized access to sensitive information, such as bank accounts and policy information. Cybercriminals often use phishing attacks to obtain user credentials.
  • Supply Chain Attacks: These occur when a trusted third-party vendor software is compromised, injecting malware into the software. Once a business downloads the software, it also becomes compromised.
  • Insider Threat: Internal attacks are perpetrated by employees or former employees who have direct access to company information or knowledge of business processes, usually to sell information for financial gain.
Image of person holding a phone

Take Action to Secure Your Business

  • Cultivate a Security-Aware Culture: Establish a tone at the top to create a security-conscious environment.
  • Assess Trusted Partners� Security Posture: Understand the security posture of your trusted partners. Are they secure?
  • Build Relationships with Trusted Security Partners: Have experts on hand if a security incident does occur.
  • Employee Training: Continuously educate your staff on security awareness and safety best practices.
  • Control Employee Access: Manage information access appropriately.
  • Implement Strong Authentication:
    • Use strong passwords and avoid sharing them.
    • Avoid generic accounts, i.e., accounts used by multiple users and not assigned to a unique individual.
    • Utilize passphrases for extra security, i.e., a short sentence or phrase made up of 15 characters.
    • Implement multi-factor authentication.
    • Employ password management tools, e.g., Keeper and Bitwarden.
  • Strengthen Technical Controls:
    • Install anti-malware solutions.
    • Encrypt your data.
    • Implement a firewall.
    • Apply timely security patches to your systems and software.

Enhance Protection with Cyber Liability Insurance

You can also help protect your business with a cyber liability insurance policy that covers loss of money due to financial fraud and liability claims. Work with a Jewelers Mutual agent to help you find the right insurance coverage to fit your needs at jewelersmutual.com.

Get Free Training for You and Your Staff

Enroll in the online Safety and Security Academy for in-depth courses on how to keep your business safe from cyber threats and more at jewelersmutual.com/academy.

Want to learn more about how you can keep your jewelry store safe 24/7? Read Jewelers Mutual�s comprehensive Jeweler Security Guide at jewelersmutual.com/securityguide.

Source

Learn More About Jewelers Security Alliance

JSA fulfills its mission of informing and alerting jewelers about crime through frequent E-Mail Crime Alerts and print publications, a website, seminars and consulting activities.

Learn More about JSA