Cybersecurity Incidents Are Major Business Disruptions

Recently, Allianz Insurance released its Risk Barometer for 2018, which surveyed more than 1,900 risk management experts from more than 80 countries.

The survey covered Allianz customers, insurance brokers, risk consultants, underwriters, executives and surveyors. The poll was carried out in October and November 2017.

Service Interruptions and Security Incidents go Hand-in-Hand

Businesses from small to multinational companies were asked to name their top concerns. For the sixth time in a row, service interruptions made it to the first place with 42% of all polled.

“For the first time, business interruption and cyber risk are neck-and-neck in the Allianz Risk Barometer and these risks are increasingly interlinked,” said Chris Fischer Hirs, Chief Executive Officer, AGCS.

“Whether resulting from attacks such as WannaCry, or more frequently, system failures, cyber incidents are now a major cause of business interruption for today’s networked companies whose primary assets are often data, service platforms or their groups of customers and suppliers.”

With today’s continuous progressions in business digitisation, companies see a strong link between business interruptions and cybersecurity incidents.
 
According to 40% of all those polled, the risk of cybersecurity incidents is considered the second most important issue businesses are facing today. Only five years ago, cyberattacks were listed in 15th place on the risk rating chart.

In Europe, pressure will also increase, as the European General Data Protection Regulation (GDPR) will become effective on 25 May 2018. It seems that smaller and mid-sized companies became more aware of cybersecurity risks over time.

Refocusing from Risk Identification to Prevention

The insurance industry is adapting to the increased recognition of cyber threats, but not necessarily at the same pace as these threats are increasing. Establishing expertise, integrating cyber risk into existing offerings, and adding new products is taking some time.

But the portfolio of cyber insurance offerings is growing, and the outcome of the Allianz Risk Barometer validates a growing demand, especially with GDPR looming. There needs to be a shift toward cyber threat prevention vs. reactive security measures, and that will become more important for the insurance industry, just as it is for the IT security industry.

Paradigm Shift on the Horizon

More and more companies are coming to realise that traditional reactive security efforts from the past are not keeping up with today’s cybersecurity risk landscape, even if they are implementing interconnected platforms of signature-based legacy antivirus technologies.

Typically, up to 75% of a company’s IT spending is used for management and maintenance of existing IT systems. Qualified employees’ adept at migrating legacy IT systems into modern architectures are rare and can be expensive.

On top of that comes a high percentage of legacy security technology that is based solely on detection and response capabilities, not actual prevention. This type of defense strategy consumes and depletes resources, while, at the end, it is totally ineffective.

Today, it still takes an average of 229 days until a breach is detected. Being able to quickly clean up after an incident is important, but preventing the breach in the first place is golden.

The monetary damage averages at $158 USD per breached data record, according to the ICT Ransomware Report. Additional layers of Detect and Respond systems are not capable of protecting against the high cadence of polymorphic and highly sophisticated attacks.

This is why service interruptions now lead the pack of business risks listed in the survey.

While targeted attacks are more sophisticated today, we also see a continuous evolution in malware commercialisation. Mutation and encryption tools are easily available to ‘part-time’ cyber criminals today. While those tools have existed for years, today they are available as-a-service for a low monetary investment.

Today, virtually anyone with an Internet connection can purchase toolkits or even full malware campaign services that can easily bypass traditional security solutions through a broad stack of attack vectors.

So, one piece of malware can be reused infinite times, with low or no knowledge required about malware programming. The phenomenal increase of crypto currencies is just another indicator.

Conclusion

Cybersecurity threats are not the exclusive concern of IT departments anymore - other business units are taking note of the impact to business procedures and continuity. The latest Allianz Risk-Barometer underpins the direct connection between business interruption and cybersecurity incidents.

Many companies are trying to patch their security strategy by adding and connecting more layers of legacy Detect and Respond technology that utilize a common pile of threat intelligence.

However, evasion of such multi-layer systems is possible and progressively cheaper than ever before. Organisations should rethink and modernise their cybersecurity arsenal.

True prevention is possible today, with solutions based on artificial intelligence and machine learning which are not dependent on URL lists, signatures, or heuristics, solutions that prevent attacks by way of self-sufficient math models that are extremely lightweight and compatible with corporate business needs.

To contact the GDPR Advisory Board please visit:  www.gdpr-board.co.uk

Threat Matrix

You Might Also Read: 

Businesses Using Apple & Cisco Products Pay Less For Insurance:

Companies Are Buying Cyber Insurance 'in mad panic':

 

« US City Of Atlanta Suffers An Attack
Have You Gauged The Cost Of A Cloud Outage? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

National Center for Manufacturing Sciences (NCMS) - USA

National Center for Manufacturing Sciences (NCMS) - USA

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

Instil Software

Instil Software

Instil helps technology brands transform, innovate and disrupt their markets with category-defining software products that challenge us to think, feel and act in new ways.