You came to an insurance company
Posted: Sat Feb 08, 2025 4:42 am
In order to forecast and assess the damage that may be caused by the implementation of COVID-19 threats, Kirill Shchukin suggests using expert, analytical and economic-mathematical methods and regularly conducting business process analysis in order to understand what data is a critical asset for the company and to assess the damage based on this, taking into account, however, that the assessment models used are highly dependent on current industry standards.
Reputational risks, in his opinion, are difficult to measure, but are easily felt by companies in the long term. “Let’s look at a ‘harmless’ example,” he says. “ to issue CASCO insurance for your car, and the very next day you are bombarded by phone with offers of related services: insurance, maintenance, etc. Most likely, this means that someone from the insurance company ‘leaked’ your data. What is the likelihood that you will contact this insurer again? Now imagine how much greater the belize mobile database risks of companies and your personal risks as a client are if something like this happens in the financial services or asset management services sector.”
Recalling the existence of the ISO 31000 family of standards concerning risk-oriented management and expert recommendations in this area, Sergey Samoilov, head of the network security and audit department at Axoft, nevertheless notes that there is no uniform risk management for all organizations. “There are, for example, tools for quantitative and qualitative risk assessment, absolute and relative expression of the degree of risk, subjective and objective methods of its assessment, but from them it is necessary to choose the tool that is most suitable in each specific situation,” he says.
Reputational risks, in his opinion, are difficult to measure, but are easily felt by companies in the long term. “Let’s look at a ‘harmless’ example,” he says. “ to issue CASCO insurance for your car, and the very next day you are bombarded by phone with offers of related services: insurance, maintenance, etc. Most likely, this means that someone from the insurance company ‘leaked’ your data. What is the likelihood that you will contact this insurer again? Now imagine how much greater the belize mobile database risks of companies and your personal risks as a client are if something like this happens in the financial services or asset management services sector.”
Recalling the existence of the ISO 31000 family of standards concerning risk-oriented management and expert recommendations in this area, Sergey Samoilov, head of the network security and audit department at Axoft, nevertheless notes that there is no uniform risk management for all organizations. “There are, for example, tools for quantitative and qualitative risk assessment, absolute and relative expression of the degree of risk, subjective and objective methods of its assessment, but from them it is necessary to choose the tool that is most suitable in each specific situation,” he says.