One step ahead of the hacker attacker

It only takes one event like the recent attack on Sumitomo, where hackers tried to steal £220m after hacking into the bank's computer systems, for organisations to take a closer interest in how best to protect their computer systems. For many, the first response will be to invest in additional technology designed to safeguard business critical applications, such as firewalls, intrusion detection tools and back-up facilities.

Many firms assume that if they are managing security, that equals

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact [email protected].

You are currently unable to copy this content. Please contact [email protected] to find out more.

Sorry, our subscription options are not loading right now

Please try again later. Get in touch with our customer services team if this issue persists.

New to Insurance Age? View our subscription options

If you already have an account, please sign in here.

To continue reading...

You need to sign in to use this feature. If you don’t have an Insurance Age account, please register now.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an indvidual account here: