About Cyber Insurance

Cyber Insurance is designed to help an organisation or individual mitigate the risk of a cyber-related security breach by offsetting the costs involved with recovery.

The Australian government released a report in 2015 that stated that the average cost for a cyber-attack was $276,323. The report also found that 33% of businesses in Australia experienced cyber-crime in 2014, and that 53% of the total cost is spent on detection and recovery. 

Following a sequence of major international events featuring huge data breaches, cyber insurance has really caught on in 2018, with the total value of its premiums forecasted to reach $7.5 billion by 2020. 

Is it just for Businesses?
Originally, cyber insurance was tailored to the corporate world, providing cover against the kinds of attacks faced by retailers such as David Jones, Kmart, Amazon and many others. However, Insurance companies such as AIG in Australia, Hiscox in the UK and the US, and Hartford Steam Boiler in Munich have been rolling out policies aimed at individuals. 
“All major homeowner insurers are anxious to provide some sort of cyber offering,” said Tim Zeilman, a cyber insurance specialist at Hartford Steam Boiler. “People seem to think that it is going to be a standard part of homeowner’s cover in the next 5 to 10 years.” 

How much does it usually Cost?  
While AIG and Hiscox have tailored their personal cyber insurance towards wealthy individuals, another insurer Hartford Steam Boiler believes that its cyber policy, which costs as little as $30 per year, could have an appeal beyond the very rich.
For businesses, the cost of the cover depends on specific needs and risks, and the size or budget of the company. Data Breach Insurance explains that companies must weight what it would cost them in the event they do not purchase a policy.

What does it Protect You Against?    
AIG and its peers have developed products that cover anything that could go wrong with a customer’s own IT systems. AIG’s cover ranges from data restoration after an attack to advice is the customer is a victim of cyber extortion or cyber bullying. It will also cover reputation management that will pay out on the cost of hiring a crisis consultant if compromising photos or texts are leaked from a hacked device. 

Hiscox’s personal cyber insurance covers similar risks. “It is a service driven propositions,” says Stephen Ridley, a senior underwriter specialising in cyber and data at Hiscox. As well as providing insurance, the company helps customers improve their personal cyber security. “We work with Dynarisk, an online risk management tool, which can provide an individual with a score and tips on how to improve it.”

What Doesn't It Protect You Against?     
However, AIG’s cyber-attack coverage comes with a fairly broad programming exclusion: “We do not cover any loss resulting from an error in computer programming or error in instructions to a computer,” which could lead to the rejection of almost any data attack.

The cover also states: “You have the duty to maintain security systems for the use of passwords, firewalls, and anti-virus software and the proper disposal of used hard drives or other storage media including CDs, DVD’s, modems, or other mobile drives or devices. Take action to avoid future loss, including securing any computer systems or data.” 

With these broad exclusions in place, it should be recommended that insurers outline the exact steps customers must take to ensure that they are covered in the case of a security breach.  

PC World

You might Also Read: 

Cyber Insurance Report 2017 - 2018:

Cyber Insurance: Good News & Bad News:
 

 

« Corporate Lawyers Brace For GDPR
China Is Behind A Decade Of Hacks On Software Companies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

CEPS

CEPS

CEPS is a leading think tank and forum for debate on EU affairs, ranking among the top think tanks in Europe. Topic areas include Innovation, Digital economy and Cyber-security.

BruCERT

BruCERT

BruCERT is the referral agency for dealing with computer-related and internet-related security incidents in Brunei Darussalam.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

ORS Consulting

ORS Consulting

ORS Consulting is a specialist provider of risk management advisory services supporting asset-intensive industries such as chemicals, energy, power and utilities, defence and maritime.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.