{"id":13962,"date":"2022-08-29T13:52:00","date_gmt":"2022-08-29T11:52:00","guid":{"rendered":"https:\/\/mertus-consulting.com\/2023\/06\/22\/cyber-risks-for-freelancers-threats-and-measures\/"},"modified":"2023-06-22T13:53:14","modified_gmt":"2023-06-22T11:53:14","slug":"cyber-risks-for-freelancers-threats-and-measures","status":"publish","type":"post","link":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/","title":{"rendered":"Cyber risks for freelancers &#8211; threats and measures"},"content":{"rendered":"<p><strong>Since the start of the Corona pandemic at the latest, cybercriminals have been experiencing a new peak phase. Hardly a week goes by without reports of hacking with all its unpleasant consequences &#8211; from financial damage and loss of reputation to business interruption that threatens the very existence of the company. This no longer only affects large corporations, but also small, medium-sized and individual companies. That&#8217;s why we&#8217;ll tell you in this article not only what the current risks are, but also what measures you can take to protect your business.<\/strong><\/p>\n<p>Encrypted data, leaked documents, virus-infected networks: each of these scenarios is likely to make entrepreneurs break out in a cold sweat. For more and more of them, this nightmare is becoming reality &#8211; because criminals have been tapping into new, lucrative targets for some time now: Freelancers.<\/p>\n<p>This is also reflected in the claims that regularly land on the desks of the insurance professionals at our cooperation partner exali. Time and again, criminals deprive our policyholders of data or money. While no two claims are the same, we quickly realized which concrete measures can help protect your business. We&#8217;ll tell you what they are:<\/p>\n<h2>Cyber risks &#8211; hacking as the biggest threat<\/h2>\n<p>Your business is exposed to numerous risks, but according to a <a href=\"https:\/\/www.agcs.allianz.com\/news-and-insights\/news\/allianz-risk-barometer-2022-press-de.html\"><strong><span style=\"color: #2c7873;\">study by Allianz Insurance<\/span><\/strong><\/a>, 44 percent of the 2,650 risk managers surveyed perceive cyberattacks as the greatest threat in 2022. Extortion in particular, as in ransomware attacks in which malicious software encrypts data in order to demand a ransom, triggers concern among experts.<\/p>\n<p>Larger companies have been defining strategies for their own cyber security for quite some time and implement them every day. Freelancers and smaller companies, on the other hand, often don&#8217;t know how to arm themselves against the growing threat or &#8211; much more fatally &#8211; even consider cyber risks in their business to be completely irrelevant. This is a fallacy that, in the worst case, can make or break your business! Neither horrendous expenditures nor many employees are necessary to protect your company against ransomware, DDoS attacks, social engineering and the like.<\/p>\n<h2>Cybersecurity &#8211; the basics for freelancers<\/h2>\n<p>Every company, regardless of size or industry, should take some basic steps regarding maintenance, IT setup and IT security.<\/p>\n<ul>\n<li><span style=\"color: #2c7873;\"><strong>Hardware and software for professional work<\/strong><\/span><\/li>\n<\/ul>\n<p>Free solutions seem tempting at first, because every penny counts, especially when you&#8217;re just starting out on your own. However, if your business falls victim to a cyberattack, the financial damage is multiplied and the cost savings at the beginning are quickly gone.<\/p>\n<ul>\n<li><span style=\"color: #2c7873;\"><strong>Redundant hardware<\/strong><\/span><\/li>\n<\/ul>\n<p>These additional comparable or even identical technical resources are not required for trouble-free operation. In the worst case, however, you can use them to prevent failures or at least reduce their extent. In addition, you can be up and running again quickly after a cyber incident.<\/p>\n<ul>\n<li><span style=\"color: #2c7873;\"><strong>Perform backups<\/strong><\/span><\/li>\n<\/ul>\n<p>For data backup, it&#8217;s best to use external hard drives that are completely separate from the rest of your network. This prevents unauthorized access and also protects your data from harmful influences such as water, fire or lightning.<\/p>\n<ul>\n<li><span style=\"color: #2c7873;\"><strong>Firewalls and virus scanners<\/strong><\/span><\/li>\n<\/ul>\n<p>Keep both up to date and apply updates regularly &#8211; then you have an excellent tool to detect and prevent unauthorized data traffic.<\/p>\n<ul>\n<li><span style=\"color: #2c7873;\"><strong>Stay informed<\/strong><\/span><\/li>\n<\/ul>\n<p>Cyber risks are also subject to trends. Criminals are constantly coming up with new schemes that companies have to adapt to. So keep up to date with the latest threats and train your team with information and small tests.<\/p>\n<h2>New territory: the Internet?<\/h2>\n<p>The Internet is part of our everyday lives &#8211; for freelancers in particular, an online presence is indispensable, and collaboration with customers largely takes place digitally. This shift of work to the digital world brings with it many advantages. But in order to enjoy them without worries, you should be able to move safely online.<\/p>\n<p>Most self-employed people use different accounts on completely different platforms. You should protect them with different, secure passwords. These are at least 8 characters long and usually contain upper and lower case letters, special characters and numbers. If you want to be on the safe side, change your access data every six to eight weeks. If you find it too much trouble to coordinate so many passwords, a password manager will help you. You want to learn more? The Mertus cooperation partner exali.de has written a comprehensive article with many more tips:<strong><span style=\"color: #2c7873;\"> <a style=\"color: #2c7873;\" href=\"https:\/\/www.exali.de\/Info-Base\/passwort-sicherheit\">5 tips for good password management<\/a><\/span><\/strong>.<\/p>\n<p>Part of being a freelancer is working on the road. But here, too, there are a few pitfalls lurking. You should avoid unprotected public networks without a login at all costs &#8211; you never know who else is surfing on the same network! Sending files is of course taboo in such networks. Rather surf on encrypted sites. The best way to do this is with a VPN connection (Virtual Private Network).<\/p>\n<p>When assessing your IT security, don&#8217;t forget your Internet connection at home or in the office! A router with a WPA2 key completes the measures already taken.<\/p>\n<h2>What happens in an emergency?<\/h2>\n<p>The fact is that there is no complete protection against attacks. But you can also take precautions for the worst case, a successful hack. That way, you don&#8217;t have to face the financial and reputational consequences all by yourself. Insurance solutions for cyber risks help you to bear the costs caused by a cyber attack and support you in resuming your business operations. You can recognize a good insurance solution by the following points:<\/p>\n<ul>\n<li>24 h emergency assistance<\/li>\n<li>Support in restoring your systems and ensuring continued operation &#8211; assumption of costs included<\/li>\n<li>Not only does your day-to-day operations suffer from a data leak, but so does your reputation. That&#8217;s why the benefits of a good cyber insurance policy also include the financial expenses for PR.<\/li>\n<li>Sometimes all efforts are of no use and data can no longer be decrypted after a ransomware attack. In that case, the payment of the ransom is also part of a cyber insurance policy.<\/li>\n<li>If a cyberattack makes it impossible for you to meet your obligations to customers, there is a threat of lost sales and contractual penalties. These costs should also be covered by the insurance.<\/li>\n<\/ul>\n<p>If you cause cyber damage to third parties, for example to a customer, due to professional negligence, <strong><span style=\"color: #2c7873;\"><a style=\"color: #2c7873;\" href=\"https:\/\/www.exali.de\/Berufshaftpflicht,5752.php\">the professional liability insurances through exali<\/a><\/span><\/strong> can protect you. In addition, you are also covered for claims for damages, fines and warnings.<\/p>\n<p>If you also want to protect your own business against cyber damage, the additional module &#8220;<span style=\"color: #2c7873;\"><strong><a style=\"color: #2c7873;\" href=\"https:\/\/www.exali.de\/it\/IT-Haftpflicht\/Datenschutz-und-Cyber-Eigenschaden-Deckung,123018.php\">Data protection &amp; cyber own-damage cover<\/a><\/strong><\/span>&#8221; could be the right one for you. Not only are you protected against hacker attacks, but you&#8217;re also not alone in the event of business interruptions or ransom demands. If you do not (yet) have a professional liability insurance through exali, or if you want to explicitly protect yourself against cyber risks, you can configure a customized <strong><span style=\"color: #2c7873;\"><a style=\"color: #2c7873;\" href=\"https:\/\/www.exali.de\/cyber-versicherung\/produktuebersicht\/\">Cyber Insurance<\/a><\/span><\/strong> with exali.<\/p>\n<h2>Cybersecurity is part of every business<\/h2>\n<p>Cybersecurity is not just a matter for large corporations, but should be part of every corporate strategy. Base your business on the two pillars of prevention and protection. That way, you&#8217;ll be fully prepared for cyberattacks and can focus on your work without worrying.<\/p>\n<h2>Discount on your insurance premium through Mertus<\/h2>\n<p>Via this <span style=\"color: #2c7873;\"><strong><a style=\"color: #2c7873;\" href=\"https:\/\/www.exali.de\/partner\/Mertus\">link<\/a> <\/strong><\/span>and with the discount code &#8220;<span style=\"color: #2c7873;\"><strong>mertus10<\/strong><\/span>&#8221; you get a special discount at our cooperation partner. We have compiled all the information for you <a href=\"https:\/\/mertus-consulting.com\/versicherung\/\"><span style=\"color: #2c7873;\"><strong>hier<\/strong><\/span><\/a>. If you have any questions or comments, please feel free to contact the Mertus team or the experts at exali directly.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since the start of the Corona pandemic at the latest, cybercriminals have been experiencing a new peak phase. Hardly a week goes by without reports of hacking with all its unpleasant consequences &#8211; from financial damage and loss of reputation to business interruption that threatens the very existence of the company. This no longer only [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11730,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1157,1148,1149],"tags":[1159,1153,1152,1158,1151,1143,1150,1142,1141],"class_list":["post-13962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-news-en","category-mertus-freelancing-community-en","category-partner-network","tag-cooperation-partner","tag-cyber-insurance","tag-cyber-risks","tag-cybercrime-en","tag-cybersecurity-en","tag-exali-en","tag-freelancer-en","tag-freelancing-en","tag-insurance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber risks for freelancers - threats and measures - Mertus<\/title>\n<meta name=\"description\" content=\"This Mertus Journal article looks at threats and actions in the context of cyber risk for freelancers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber risks for freelancers - threats and measures - Mertus\" \/>\n<meta property=\"og:description\" content=\"This Mertus Journal article looks at threats and actions in the context of cyber risk for freelancers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Mertus\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-29T11:52:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-22T11:53:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png\" \/>\n<meta name=\"author\" content=\"sbadminmt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sbadminmt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber risks for freelancers - threats and measures - Mertus","description":"This Mertus Journal article looks at threats and actions in the context of cyber risk for freelancers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/","og_locale":"en_US","og_type":"article","og_title":"Cyber risks for freelancers - threats and measures - Mertus","og_description":"This Mertus Journal article looks at threats and actions in the context of cyber risk for freelancers.","og_url":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/","og_site_name":"Mertus","article_published_time":"2022-08-29T11:52:00+00:00","article_modified_time":"2023-06-22T11:53:14+00:00","og_image":[{"url":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png","type":"","width":"","height":""}],"author":"sbadminmt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sbadminmt","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#article","isPartOf":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/"},"author":{"name":"sbadminmt","@id":"https:\/\/mertus-consulting.com\/en\/#\/schema\/person\/e9cb8dff79027ac2ee6810b906a1c9bc"},"headline":"Cyber risks for freelancers &#8211; threats and measures","datePublished":"2022-08-29T11:52:00+00:00","dateModified":"2023-06-22T11:53:14+00:00","mainEntityOfPage":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/"},"wordCount":1260,"commentCount":0,"publisher":{"@id":"https:\/\/mertus-consulting.com\/en\/#organization"},"image":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png","keywords":["Cooperation partner","Cyber insurance","Cyber risks","Cybercrime","Cybersecurity","exali","Freelancer","Freelancing","Insurance"],"articleSection":["IT News","Mertus Freelancing Community","Partner network"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/","url":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/","name":"Cyber risks for freelancers - threats and measures - Mertus","isPartOf":{"@id":"https:\/\/mertus-consulting.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#primaryimage"},"image":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#primaryimage"},"thumbnailUrl":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png","datePublished":"2022-08-29T11:52:00+00:00","dateModified":"2023-06-22T11:53:14+00:00","description":"This Mertus Journal article looks at threats and actions in the context of cyber risk for freelancers.","breadcrumb":{"@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#primaryimage","url":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png","contentUrl":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2022\/08\/CYBER-RISIKEN-blog.png","width":510,"height":213},{"@type":"BreadcrumbList","@id":"https:\/\/mertus-consulting.com\/en\/2022\/08\/29\/cyber-risks-for-freelancers-threats-and-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/mertus-consulting.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber risks for freelancers &#8211; threats and measures"}]},{"@type":"WebSite","@id":"https:\/\/mertus-consulting.com\/en\/#website","url":"https:\/\/mertus-consulting.com\/en\/","name":"Mertus","description":"IT Experts on Point.","publisher":{"@id":"https:\/\/mertus-consulting.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mertus-consulting.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mertus-consulting.com\/en\/#organization","name":"Mertus Consulting UG (haftungsbeschr\u00e4nkt)","url":"https:\/\/mertus-consulting.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mertus-consulting.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2021\/08\/ms-icon-310x310-1.png","contentUrl":"https:\/\/mertus-consulting.com\/wp-content\/uploads\/2021\/08\/ms-icon-310x310-1.png","width":310,"height":310,"caption":"Mertus Consulting UG (haftungsbeschr\u00e4nkt)"},"image":{"@id":"https:\/\/mertus-consulting.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/mertus"]},{"@type":"Person","@id":"https:\/\/mertus-consulting.com\/en\/#\/schema\/person\/e9cb8dff79027ac2ee6810b906a1c9bc","name":"sbadminmt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/848293204d6ddb160eca1918610d2c629cb6bb94181349714db7c38316c675dd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/848293204d6ddb160eca1918610d2c629cb6bb94181349714db7c38316c675dd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/848293204d6ddb160eca1918610d2c629cb6bb94181349714db7c38316c675dd?s=96&d=mm&r=g","caption":"sbadminmt"},"sameAs":["http:\/\/skillbition.com"]}]}},"_links":{"self":[{"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/posts\/13962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/comments?post=13962"}],"version-history":[{"count":1,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/posts\/13962\/revisions"}],"predecessor-version":[{"id":13963,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/posts\/13962\/revisions\/13963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/media\/11730"}],"wp:attachment":[{"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/media?parent=13962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/categories?post=13962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mertus-consulting.com\/en\/wp-json\/wp\/v2\/tags?post=13962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}