About Cyber Insurance

Cyber Insurance is designed to help an organisation or individual mitigate the risk of a cyber-related security breach by offsetting the costs involved with recovery.

The Australian government released a report in 2015 that stated that the average cost for a cyber-attack was $276,323. The report also found that 33% of businesses in Australia experienced cyber-crime in 2014, and that 53% of the total cost is spent on detection and recovery. 

Following a sequence of major international events featuring huge data breaches, cyber insurance has really caught on in 2018, with the total value of its premiums forecasted to reach $7.5 billion by 2020. 

Is it just for Businesses?
Originally, cyber insurance was tailored to the corporate world, providing cover against the kinds of attacks faced by retailers such as David Jones, Kmart, Amazon and many others. However, Insurance companies such as AIG in Australia, Hiscox in the UK and the US, and Hartford Steam Boiler in Munich have been rolling out policies aimed at individuals. 
“All major homeowner insurers are anxious to provide some sort of cyber offering,” said Tim Zeilman, a cyber insurance specialist at Hartford Steam Boiler. “People seem to think that it is going to be a standard part of homeowner’s cover in the next 5 to 10 years.” 

How much does it usually Cost?  
While AIG and Hiscox have tailored their personal cyber insurance towards wealthy individuals, another insurer Hartford Steam Boiler believes that its cyber policy, which costs as little as $30 per year, could have an appeal beyond the very rich.
For businesses, the cost of the cover depends on specific needs and risks, and the size or budget of the company. Data Breach Insurance explains that companies must weight what it would cost them in the event they do not purchase a policy.

What does it Protect You Against?    
AIG and its peers have developed products that cover anything that could go wrong with a customer’s own IT systems. AIG’s cover ranges from data restoration after an attack to advice is the customer is a victim of cyber extortion or cyber bullying. It will also cover reputation management that will pay out on the cost of hiring a crisis consultant if compromising photos or texts are leaked from a hacked device. 

Hiscox’s personal cyber insurance covers similar risks. “It is a service driven propositions,” says Stephen Ridley, a senior underwriter specialising in cyber and data at Hiscox. As well as providing insurance, the company helps customers improve their personal cyber security. “We work with Dynarisk, an online risk management tool, which can provide an individual with a score and tips on how to improve it.”

What Doesn't It Protect You Against?     
However, AIG’s cyber-attack coverage comes with a fairly broad programming exclusion: “We do not cover any loss resulting from an error in computer programming or error in instructions to a computer,” which could lead to the rejection of almost any data attack.

The cover also states: “You have the duty to maintain security systems for the use of passwords, firewalls, and anti-virus software and the proper disposal of used hard drives or other storage media including CDs, DVD’s, modems, or other mobile drives or devices. Take action to avoid future loss, including securing any computer systems or data.” 

With these broad exclusions in place, it should be recommended that insurers outline the exact steps customers must take to ensure that they are covered in the case of a security breach.  

PC World

You might Also Read: 

Cyber Insurance Report 2017 - 2018:

Cyber Insurance: Good News & Bad News:
 

 

« Corporate Lawyers Brace For GDPR
China Is Behind A Decade Of Hacks On Software Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Salient CRGT

Salient CRGT

Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

LogicBoost Labs

LogicBoost Labs

LogicBoost Labs has the expertise, experience, funding and connections to make your startup succeed. We are always interested in new ways to change the world for the better.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Cyber-Security Council Germany

Cyber-Security Council Germany

The German Cyber Security Council's objective is to consult businesses, government agencies and political decision-makers and to support them against cybercrime.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.