Companies Are Buying Cyber Insurance 'in mad panic'

With cyber-attacks increasing in frequency and severity, many companies are turning to insurance to cover their mounting losses. But can insurers quantify the risk accurately and could insurance lead to corporate complacency?
Many firms feel like they're under siege.

Cyber-attacks are coming thick and fast and the tools at the hackers' disposal seem to be getting more, not less, powerful.
Estimated annual losses from cybercrime now top $400bn (£291bn), according to the Center for Strategic and International Studies. The cost in lost productivity of last year's WannaCry ransomware attack alone was estimated at $4bn. So many businesses are buying cyber insurance "in a mad panic", warns Charl van der Walt of SecureData, a cyber-security company.

"Unfortunately this will mean that businesses of all sizes will seek out the minimum cyber-security investment laid out by insurers, government, and regulators, rather than going above and beyond to protect their own, and their customers' data."

Ransomware attacks, whereby criminals break in to your network, encrypt all your data, then demand money in return for the decryption key, are particularly virulent. Firms have even been stocking up on Bitcoins, the hackers' cryptocurrency payment of choice, to pay the ransoms. It's not just the immediate ransom costs they have to worry about. There are the costs of investigating and closing the breach, legal and public relations costs, the damage to your share price as consumers and clients lose confidence, and the loss of business resulting from a damaged reputation.

There are also potential regulatory fines to pay, particularly when the European Union's General Data Protection Regulation (GDPR) comes into force in May. Under the new rules your firm could be fined up to 4% of turnover or €20m, whichever is the greater, if regulators think you haven't protected customers' personal data adequately.

The average cost of a cyber breach was $349,000 in 2017, according to NetDiligence, whose data is based on actual cyber insurance claims. For a big company the average cost was $5.9m.

But US retailer Target, which had more than 40 million customer credit card details stolen in 2013, had to fork out $279m in total as a result of the breach, says specialist insurance market Lloyd's of London in a report compiled with consultancy KPMG and international law firm DAC Beachcroft. Around $100m of that was on lawsuits.

Telecoms company TalkTalk suffered losses of nearly $100m after its breach in 2015, says Lloyd's, and this included a £400,000 fine from the UK Information Commissioner's Office.

So it's perhaps little surprise that interest in cyber insurance has spiked recently.

The number of insurers offering cyber insurance via Lloyd's of London has leapt to more than 70, nearly double the number a few years ago. And insurance giant Allianz predicts that global cyber insurance premiums will grow to $20bn by 2025, up from around $3-4bn now. 

One insurer, Hiscox, says it has been enjoying robust growth in its cyber insurance business, particularly following the TalkTalk breach and as GDPR approaches.

"We're seeing annual growth of around 40% in cyber," says Gareth Wharton, chief executive of cyber at the insurer. "We expect to have taken around $100m in premiums in 2017."

But how do insurers know how to assess cyber risk accurately and set the right premium levels? "Cyber isn't like car or house insurance where the risks are known and the products haven't changed that much," says Mr Wharton. "The types of risk are changing all the time and there's no easy way of quantifying the cost of stolen data." So it's up to the insurer to make sure the client is an acceptable risk, he says.

"Firstly we need to understand how seriously the board takes cyber-security," says Mr Wharton. "Does it have a disaster recovery plan and how often does it test it?" 

The firm checks obvious security measures, too, such as the presence of antivirus and firewall protection, the frequency of software updates and data back-ups, and whether critical data is encrypted, he says. 

"We're trying to be a partner with our clients, not just a seller of insurance, so we offer free cyber security training as well. We have a responsibility to drive up standards and encourage better practice."

While there are several recognised ISO [International Organisation for Standardisation] standards covering various aspects of information security, there isn't one catch-all standard that global businesses can adopt to help insurers assess their cyber risk. 

The UK government insists that any company it does business with has to conform to the Cyber Essentials standards set by the National Cyber Security Centre. That's a start at least. "One of the biggest issues in cyber insurance is how to price it effectively and cover indirect as well as direct costs a company suffers following a cyber-attack," says Nik Whitfield, chief executive of Panaseer, a cyber risk assessor. Firms seeking insurance would be happy to be assessed in the hope of securing lower premiums, he argues.  

"Such a service would be the equivalent of a telematics box in your car which tells the insurance company how well you're driving."

But if firms see cyber insurance merely as an excuse to skimp on their cyber-security defences, they could find themselves in trouble, he warns. "Businesses must understand that cyber insurance is not a silver bullet, you don't get car insurance and drive like a maniac," he says.

BBC:    Image: Nik Youngson

You Might Also Read: 

Cyber Risk Insurance: A View From The Prudential Regulation Authority:

Insurance Will Reduce Cyber Losses:

Cyber Security Insurance:

 

 

« What Is Fog Computing?
World Economic Leaders Fear Increasing Cyber Attacks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

CERT Polska

CERT Polska

CERT Polska is the first Polish computer emergency response team and operates within the structures of NASK (Research and Academic Computer Network) research institute.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

SafeCipher

SafeCipher

At SafeCipher, we pride ourselves on being your single vendor-neutral resource for navigating the complexities of cryptographic data encryption.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

SessionGuardian

SessionGuardian

SessionGuardian (formerly SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

Fortreum

Fortreum

Fortreum aim to simplify cybersecurity in the marketplace to accelerate your business outcomes.