Cyber Threats Are The Top Insurance Risk

Cyber insurance is evolving fast as the incidence of data breaches from insider and malicious external threats have become more prevalent. Just a few years ago, cyber insurance was considered important because of data breach concerns and protecting organisations’ liability if private data was exposed. Today, the focus is on the potentially huge losses stemming from cyber-crime.

Research carried out by the  UK insurance firm Gallagher polled 1000 UK business leaders in organisations of various sizes and nearly two-fifths (39%) cited cyber-attacks as one of their biggest concerns. Of these, 82% reported  they do not have specialist insurance.

The shift in the number one cause of loss is a result of both the growing sophistication of cyber criminals’ attack methods as well as businesses’ ability to adapt to cyber threats. It calculated the average number of attacks aimed at a single business last year was 576,575, around 152% higher than the 281,094 recorded in 2018 and the highest since the ISP began analysing this kind of data in 2016. 

A few years ago, credit card breaches at retailers like Home Depot, with 56 million cards compromised, and Target, with 41 million cards compromised, were making headlines. Today, the number of credit card breaches in the news has dropped off, and that’s because businesses have learned their lesson and adopted end-to-end encryption, among other controls. 

Now criminals set their sights on phishing emails, which entice users to click on suspicious links and provide crucial information, and business email compromise, where criminals impersonate employees and management to convince other employees to wire money to nefarious accounts.

Cyber risks have evolved even further. The range of businesses that can become victims of ransomware is broad. In one example highlighted a recent analysis carried out by the Tokio Marine insurance firm, an assistant restaurant manager downloaded an email attachment that looked like a spreadsheet from her manager on to the restaurant’s computer. 

Unfortunately, the file contained the Ryuk virus, which blocked access to the operating system and encrypted all the files on the computer.  A message appeared on the computer notifying the manager that the system and all files were encrypted and would only be unlocked if he paid a ransom of more than $200,000 using Bitcoin.

The higher levels of ransom increasingly being demanded by hackers to restore data is a notable trend and insurers are sensitive to the soaring costs of a successful ransom attack. 

Insurance Business:       Infosecurity:      Reinsurance News:       Infosecurity:     Gallagher Insurance:     CyberCureMe:

You Might Also Read:

Paying Cyber criminals A Ransom Will Double Your Recovery Costs:

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured:

 

« Inside The Deep & The Dark Web
Twitter Is Trying To Control Propaganda »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Sequretek

Sequretek

Sequretek was formed with the aim to “Simplify Security”. We envision a future where enterprise networks are streamlined, secure and simple.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

SDG Corp

SDG Corp

SDG is a global cybersecurity, identity governance, risk consulting and advisory firm, addressing complex security, compliance and technology needs.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Diverto

Diverto

Diverto is a company that provides a high level of information security to companies, institutions and other organisations in an information-centric world.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.