Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but  is only now becoming  a popular safeguard against hackers.

Cybersecurity insurance is an insurance policy that is designed to help with the losses from a variety of cyber incidents, such as data breaches, business interruption or network damage. Each cybersecurity insurance policy, while similar to another policy, is never exactly the same as other insurance policies.

Almost every industry, from agriculture to healthcare, is using online data for its services. The so-called “Internet of Things” (IoT) — the network connectivity of everyday objects — will lead to new capabilities that could yield a $3 trillion a year economic increase by 2025, according to a McKinsey Report. Businesses have to keep up with the rest of the market and adapt to the online world.

“Cyber Insurance has been around for many years; however, it has been mostly focused on hardware or physical damage as a result of a cybercrime so most companies do not have coverage for data loss even today,” Joseph Carson, director of Global Strategic Alliances at Thycotic, a US.-based cybersecurity firm.

“With more and more companies becoming dependent on IT and data” there has been “a significant change with data becoming more tangible and having significant monetary value where we have seen the likes of Facebook, Airbnb and Uber becoming multibillion dollar companies almost purely based on information and data,” he continued.

Cybersecurity insurance is only one arrow in your quiver used in the protection of your organization’s electronic protected health information (ePHI). It is only one part of your organization’s mitigation and it is important to remember that it is not the solution to a HIPAA security incident or a HIPAA breach event.

There are two general categories of risks and potential liabilities for ePHI breaches, those that happen within your organization and those that happen with one or more of your vendors or business associates. Since there are two categories, your organization should consider purchasing both first-party and third party cybersecurity coverage. With these two types of coverage your organization would be the first-party and your vendors and business associates would be the third parties.

First-party losses may include loss or damage to your organization’s ePHI; corrupted, lost, stolen or ransomed ePHI by loss or stealing of devices or due to a virus; network interruption or denial of service attack, or; the inability to conduct business due to an ePHI breach or loss.

Third party risks include your organization’s liability to its clients or patients, and in various states and on the federal level, regulatory investigations and fines.

What incidents might be covered by insurance?

  • Unencrypted devices
  • ePHI in the control of a third party;
  • Human error, mistakes and negligence;
  • External attacks by cyber criminals;
  • System, data center, or business process failures;
  • Malicious or criminal insiders; and
  • Credit cards.

What benefits, or protections, might be covered by insurance?

  •      Notification costs to data breach victims, media and other;
  •      Legal defense costs;
  •      Forensics and investigative costs;
  •      Regulatory penalties and fines;
  •      Revenue losses;
  •      Third party liability;
  •      Communication costs; and Productivity losses. 

There are also very specifically outlined and defined exclusions in a cybersecurity policy. They often include the following:

  •  Breaches of PHI in paper files;
  •  Claims brought by the government or regulators, including the Office of Civil Rights, the Department of Health    and Human Services, and the Office of a state’s Attorney General, plus various state’s laws;
  • Vicarious liability, for data entrusted to a third-party vendor, when the breach occurs on the vendor’s system;
  • Unencrypted ePHI; and
  • If your organization waits too long to report the event to the insurance company.

The cost of cybersecurity insurance continues to increase, as is the dollar amount deductible that your organization will have to pay up-front before any insurance payments will kick in. The deductible excess is now $25,000.00 on many policies.

Cybersecurity insurance is quickly becoming a necessity for many healthcare organizations, but it is only one piece of an organization’s mitigation. Other parts of mitigation include: a yearly HIPAA Security Risk Analysis/Assessment, a yearly internal or external HIPAA Audit, and a yearly HIPAA Security, Privacy and Breach Training, plus constant, on-going vigilance.

The need for cyber insurance is more urgent as every sector of society becomes more interconnected through internet. “Almost all data has a monetary value,” Carson stated. “Absolutely any company that is helping organizations protect and provide cybersecurity to their business and will help reduce the risk of cybercrime” will reap the rewards.

Conclusion: Your organization must understand all the provisions of the cybersecurity insurance policy before it is signed and paid for.

Litmos:  Daily Caller

« Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS
Brexit Fallout Continues – ePrivacy »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Paladin Capital Group

Paladin Capital Group

Paladin is a leading global investor that supports and grows the world’s most innovative cyber companies.

Schneider Downs

Schneider Downs

Schneider Downs & Co. provides accounting, tax and business advisory services through innovative thought leaders who deliver their expertise to meet the individual needs of each client.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

Focus on Security

Focus on Security

Focus on Security are Cyber Security recruitment specialists. We’re dedicated to connecting you with the top Cyber Security talent across the globe. We focus on partnerships and results.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.

Universal Technical Resource Services (UTRS)

Universal Technical Resource Services (UTRS)

UTRS is a technology firm that delivers a wide range of engineering, technical, strategic, and digital services to the public and private sectors.

Holiseum

Holiseum

Holiseum delivers innovative cybersecurity solutions for the critical infrastructure organizations, as well as cybersecurity services and consulting.