{"id":5090,"date":"2023-05-15T07:30:17","date_gmt":"2023-05-15T00:30:17","guid":{"rendered":"http:\/\/ligaasuransi.com\/?p=5090"},"modified":"2023-05-15T09:46:28","modified_gmt":"2023-05-15T02:46:28","slug":"layanan-mobil-banking-dan-atm-bsi-terganggu-akibat-cyber-attack","status":"publish","type":"post","link":"https:\/\/ligaasuransi.com\/en\/layanan-mobil-banking-dan-atm-bsi-terganggu-akibat-cyber-attack\/","title":{"rendered":"BSI Customers Affected By System Outage Due To Suspected Cyber Attack"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><a href=\"http:\/\/ligaasuransi.com\/\">Liga Asuransi<\/a> &#8211; Dear readers, how are you? I hope your business is running well as planned.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a senior insurance broker, I tell our clients, \u201cAccidents can happen anywhere, anytime, and to anyone.\u201d And that is true. It started showing up in a recent Cyber risk accident in Indonesia. Cyber risks are the most significant threats to business in the future.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are interested in this article, please share it with your friends so they can understand as you do.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On Monday, 8 May 2023, it was reported by social media that a state-owned bank PT Bank Syariah Indonesia Tbk (BRIS) or BSI&#8217;s mobile banking and ATM networks experienced disruptions that have yet to recover fully. The Minister of State-Owned Enterprises (SOEs), Erick Thohir, stated that the disruption was caused by a cyberattack that attacked Indonesia&#8217;s largest Islamic bank.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Erick explained that BSI was repairing the system, but it was accompanied by a cyber-attack that broke it for almost a day. Although he did not know the details of the attack, Erick continued to monitor the development of BSI system disruptions, as well as BSI President Director Hery Gunardi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to Erick, three days before the disruption occurred, he had just met with Hery Gunardi to discuss the bank&#8217;s IT system. However, the disorder occurs suddenly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Erick and Hery Gunardi continue to monitor this problem to ensure the BSI system returns to normal. This incident shows the importance of cybersecurity protection in the banking system in Indonesia and the need for measures to prevent similar attacks in the future.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>THE ROLES OF CYBER SECURITY AND CYBER INSURANCE\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The recent incident involving the disruption of the Bank Syariah Indonesia (BSI) banking system highlights the importance of cyber security and insurance. Cybersecurity is critical in the banking industry as financial institutions are vulnerable to cyber threats such as phishing, malware, and ransomware attacks. Such threats can lead to financial loss, reputational damage, and regulatory fines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this regard, robust cybersecurity measures are necessary to protect sensitive financial data and ensure the continuity of banking operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/lngrisk.co.id\/perlindungan-keamanan-untuk-bisnis-anda-dengan-cyber-insurance\/\">Cyber insurance<\/a> is also essential in mitigating the economic impact of cyber threats. Cyber insurance covers cyber-attack losses, including business interruption, data breaches, and liability claims.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber insurance can provide financial protection for financial institutions, allowing them to respond to and recover from cyber-attacks more efficiently. It can also incentivize companies to invest in cybersecurity measures, as insurance companies often require specific security protocols to be in place before providing coverage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security and cyber insurance are essential components in the banking industry, where protecting financial data and ensuring the continuity of banking operations is critical. Implementing robust cybersecurity measures and having cyber insurance in place can help financial institutions prevent, mitigate and respond to cyber threats, ultimately safeguarding their customers&#8217; interests and reputations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>WHAT ARE THE POSSIBLE CAUSES OF THE DISRUPTION?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">What type of cyber-attack disrupted the Bank Syariah Indonesia (BSI) banking system is still unclear. However, cyber-attacks can take various forms, including:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Malware<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Malicious software is designed to infect computer systems and disrupt or damage their operations.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Ransomware<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">A type of malware that encrypts files on the targeted system and demands a ransom payment in exchange for the decryption key.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Phishing<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">An attempt to steal sensitive information, such as login credentials and financial data, by tricking users into clicking on links or opening attachments in email messages that appear to be from legitimate sources.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>DdoS<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Distributed Denial of Service attacks overwhelms a website or network by flooding it with traffic from multiple sources, causing it to crash or become unavailable.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Insider Threat<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">An employee or insider with access to sensitive systems could intentionally or unintentionally cause a security breach, leading to a cyber-attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to note that cyber-attacks can be sophisticated, with attackers using a combination of techniques to achieve their objectives. The specific cause of the cyber-attack on BSI may be challenging to determine.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still, robust cybersecurity measures are needed to prevent future attacks and protect sensitive financial data.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>RANSOMWARE IS A POSSIBLE CAUSE \u2013 CYBER EXPERT SAID<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ransomware is malicious software that encrypts files on a computer or network and demands a ransom payment for the decryption key.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of BSI, if ransomware were indeed the cause of the cyber-attack, it would mean that the attackers could gain access to the bank&#8217;s systems and encrypt their files, demanding a ransom in exchange for the decryption key.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s important to note that paying the ransom does not guarantee that the attackers will provide the decryption key, which may encourage further attacks. Therefore, organizations must implement adequate cybersecurity measures to prevent and mitigate the impact of ransomware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here&#8217;s how a ransomware attack typically happens:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Infection<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Ransomware is introduced to the system through a phishing email or malicious link or by exploiting a vulnerability in the system.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Encryption<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once the ransomware is installed, it encrypts files on the system, making them inaccessible to the user.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Ransom note<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The attacker displays a message demanding payment in exchange for the decryption key. The note often includes a countdown timer and a threat to delete the files if the ransom is unpaid.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Payment<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The attacker demands payment in cryptocurrency, such as Bitcoin, to make tracing difficult. The victim is instructed to transfer the amount to a specific Bitcoin wallet address.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Decryption<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once the ransom is paid, the attacker provides the decryption key to the victim, allowing them to access their files.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>THE BEST SOLUTION ON BSI SITUATION\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To solve the situation of the cyber-attack on Bank Syariah Indonesia (BSI), the following solutions can be considered:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Conduct a thorough investigation.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The bank needs to conduct a thorough investigation to determine the root cause of the cyber-attack and the extent of the damage caused. This will help to identify vulnerabilities in the bank&#8217;s IT systems and implement measures to prevent future attacks.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Implement robust cybersecurity measures.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The bank should implement strong cybersecurity measures, including firewalls, anti-virus software, intrusion detection and prevention systems, and two-factor authentication. Regular security audits and penetration testing can also help to identify and address vulnerabilities.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Educate employees and customers.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Employees and customers should be educated on the importance of cybersecurity, including identifying and reporting suspicious activity, creating strong passwords, and avoiding phishing scams.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Develop a cyber incident response plan.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The bank should have a well-defined and tested incident response plan to minimize the impact of a cyber-attack. The plan should include procedures for detecting and containing an attack and restoring IT systems and services.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Consider cyber insurance.<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can provide financial protection during a cyber-attack, covering the costs of investigating and responding to the attack and any damages and losses incurred.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By implementing these solutions, BSI can enhance its cybersecurity posture and reduce the risk of future cyber-attack risks.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>HOW ABOUT THE DISTRIBUTED DATA?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Data recovery should be a top priority if the Bank Syariah Indonesia (BSI) has experienced data disruption or loss due to the cyber-attack. The bank should have backup systems to restore critical data during a cyber-attack. Data recovery may be more challenging if the attack also affects the backup systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In such a scenario, the bank should engage data recovery experts to attempt to retrieve any lost data. The experts may be able to restore data from backup systems or use specialized tools to recover data from damaged hardware. It is important to note that data recovery can be a time-consuming and expensive process, and there is no guarantee that all lost data can be recovered.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To prevent future data loss, the bank should review its data backup and recovery procedures and ensure they are robust and effective. It may also be necessary to implement additional measures, such as data encryption and access controls, to protect sensitive data from unauthorized access and theft.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>WHAT IS THE COVERAGE OF CYBER INSURANCE?\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The coverage of cyber insurance varies depending on the policy and insurer, but generally, cyber insurance provides coverage for the following:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Data breaches<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover the costs associated with data breaches, including investigating the breach, notifying affected parties, and providing credit monitoring services.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Business interruption<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover lost income and other expenses associated with a cyber-attack that causes a business interruption.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Cyber extortion<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover the costs associated with cyber extortion, such as ransomware payments.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Privacy liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover the costs associated with a privacy violation, such as legal fees, settlements, and damages.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Network security liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover the costs associated with a network security failure, such as legal fees, settlements, and damages.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Media liability<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cyber insurance can cover the costs of a media liability claim, such as copyright infringement or defamation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to note that cyber insurance policies can vary significantly in terms of coverage and exclusions, so it is essential to carefully review policy terms and consult with an insurance professional to ensure that the policy meets the specific needs of the organization.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Mengapa Cyber Insurance Sangat Penting? #cyberinsurance #cybersecurity #cyber\" width=\"1170\" height=\"658\" src=\"https:\/\/www.youtube.com\/embed\/jPFFoM9c-9w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><b>WHAT IS INFORMATION REQUIRED TO ARRANGE CYBER INSURANCE?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The underwriting information needed for cyber insurance varies depending on the insurer and policy, but generally, insurers will request the following information:<\/span><\/p>\n<p><b>Business Information<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Insurers will request basic information about the company, such as its legal name, address, and industry.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Cybersecurity posture<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurers will request information about the company&#8217;s cybersecurity posture, including its cybersecurity policies and procedures, employee training programs, and risk management practices.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>IT systems and controls<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurers will request information about the company&#8217;s IT systems and controls, such as the types of hardware and software used, network architecture, and security controls.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Data inventory<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurers will request information about the company&#8217;s data inventory, including the types of data stored, the location of data, and how data is protected.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Incident response plan<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurers will request information about the company&#8217;s incident response plan, including who is responsible for managing a cyber incident, how incidents are detected, and how incidents are resolved.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Previous cyber incidents<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurers will request information about any previous cyber incidents the company has experienced, including the nature of the incident, the impact of the incident, and how the incident was resolved.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Insurers may also request additional information based on the specific policy and coverage being underwritten. Organizations must be transparent and provide accurate and complete information to insurers to ensure they receive appropriate coverage and avoid potential coverage disputes during a cyber incident.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>WHY DO COMPANIES NEED AN INSURANCE BROKER TO ARRANGE CYBER INSURANCE?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Banks, like any other organization, may benefit from working with an insurance broker to arrange their cyber insurance coverage. There are several reasons why a bank may choose to work with an insurance broker:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Expertise<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurance brokers are experts in the insurance industry and have specialized knowledge of the types of coverage available, the policies and terms offered by different insurers, and the potential risks and exposures facing banks.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Access to insurers<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurance brokers have relationships with multiple insurers and can help banks to access a broader range of insurance options than they might be able to on their own.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Customization<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurance brokers can work with banks to customize their cyber insurance coverage to meet their specific needs and risk profile. They can help to identify gaps in coverage and recommend policy terms and limits that will provide appropriate protection.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Negotiation<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Insurance brokers can negotiate with insurers on behalf of banks to secure favorable policy terms and pricing.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Claims support<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In the event of a cyber incident, insurance brokers can provide claims support and advocacy to help banks navigate the claims process and maximize their recovery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Working with an insurance broker can help banks better understand their cyber risk exposure and secure appropriate coverage to protect against potential losses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the leading <a href=\"https:\/\/lngrisk.co.id\/\">insurance brokers<\/a> in Indonesia focusing on Cyber Insurance is L&amp;G Insurance Broker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For all your insurance needs, please call L&amp;G now!<\/span><\/p>\n<p><strong>\u2014<\/strong><\/p>\n<h3><strong>LOOKING FOR INSURANCE PRODUCTS? DON&#8217;T WASTE YOUR TIME AND CONTACT US RIGHT NOW<\/strong><\/h3>\n<h3><strong>L&amp;G HOTLINE 24 HOURS: <a href=\"https:\/\/api.whatsapp.com\/send?phone=628118507773&amp;text=Halo%20L%26G%20Risk,%20Saya%20mau%20menanyakan%20lebih%20detil%20mengenai%20asuransi.%0D%0A%2D%2D%2D%0D%0ANama%3A%0D%0APerusahaan%3A%0D%0AJenis%20Asuransi%3A%0D%0AObjek%20yang%20diasuransikan%3A%0D%0A%2D%2D%2D%0D%0AMohon%20hubungi%20saya%20segera%21\">0811-8507-773<\/a> (CALL \u2013 WHATSAPP \u2013 SMS)<\/strong><\/h3>\n<p>website: lngrisk.co.id<\/p>\n<p>E-mail: customer.support@lngrisk.co.id<\/p>\n<p>\u2014<\/p>","protected":false},"excerpt":{"rendered":"<p>Liga Asuransi &#8211; Dear readers, how are you? I hope your business is running well as planned. As a senior insurance broker, I tell our clients, \u201cAccidents can happen anywhere, anytime, and to anyone.\u201d And that is true. It started showing up in a recent Cyber risk accident in Indonesia. Cyber risks are the most [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":5091,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[799],"tags":[800],"class_list":{"0":"post-5090","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-risk-insurance","8":"tag-cyber-risk-insurance"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/5090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/comments?post=5090"}],"version-history":[{"count":6,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/5090\/revisions"}],"predecessor-version":[{"id":5097,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/posts\/5090\/revisions\/5097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media\/5091"}],"wp:attachment":[{"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/media?parent=5090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/categories?post=5090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ligaasuransi.com\/en\/wp-json\/wp\/v2\/tags?post=5090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}