India’s Cyber Insurance Business Is Flourishing

Cyber risk is a major threat to Indian businesses today as companies increasingly face new vulnerabilities due to exposure.

In an exclusive interview with BW Businessworld, Rahul Mohata COO, Ideal Insurance speaks about how organisations can minimise the financial impact due to a cyber-attack if they opt for an insurance, awareness among businesses regarding cyber-attacks and more.

Here are some extracts:

How can organisations minimise their financial impact if they opt for cyber liability insurance?

All businesses now are dependent on the use of technology specially internet and cloud, which makes them vulnerable of cyber-crime and online data theft and misuse.

Cyber liability policies are indemnity policies and cover any loss which may arise because of the peril covered under the policy. The client based on his assessment or legal requirement buys a policy with an indemnity amount. The insurer generally covers privacy breach liability, cyber extortion, business interruption losses, liability from multimedia and public relations costs, legal expenses and data theft liability.

If the data is stolen or hacked, the insurer will pay for any legal cost which the insured pay if there is a suit filed in a court of law. The Insurer will also indemnify the amount awarded by the court of law subject to admissibility of the claim by the Insurer.

Do you see the awareness among businesses regarding cyber-attacks in India?

The 'Internet Security Threat' report that was released in 2013 by Norton (Symantec) has stated India has 42 million cyber-crimes every year. On a regular basis we come across press reports on breach of cyber security by way of attacks such as malware, viruses, hacking, scams, fraud and theft.

Though the large corporates are still aware and work towards cyber security, but the mid-size and small enterprises are highly vulnerable towards such risk due to lack of awareness.

In a data driven world, if a company suffers a data breach but can’t monetise the value of that data, how can this insurance help?

Since the insurance cover is for paying for any legal cost which the insured pay if there is a suit filed in a court of law. The insurer will also indemnify the amount awarded by the court of law subject to admissibility of the claim by the Insurer. Hence, the question of monetising the data does not arise in this case.

Do you believe that companies in India compromise with their cyber security?

There are corporate who have taken this policy. However, there is a huge gap and it is mostly due to lack of awareness and has become obligatory and not mandatory as the check and balances are not yet in place.

How has been the response like especially when MSMEs in India are not very active on this front?

The smaller firms are often hit hardest by a cyber-attack but unfortunately lack of awareness about cyber risk prevents most of the MSMEs in India from adopting key cyber security initiatives. But very soon companies of every size will demand cyber insurance, as most of the businesses are depended on technology.

How do you make this insurance policy customer friendly?

These policies are tailor made and as per requirement of the customers. Cyber risk affects industries such as technology and financial institutions differently so tailor made solutions suiting each client segment is suggested. Due diligence is specially done for companies with internet-related operations and large technology-related and also for those storing a large quantity of customer data.

Cyber-attacks on cloud environments have reached the same level as attacks on traditional IT infrastructures, and it seems likely that the trend towards cyber-attacks on cloud based infrastructures will see further increases. So, do you provide insurance against such attacks?

Yes, covers are available for such risks. In these cases, the cloud based service provider will have to take insurance which will protect him against any perils of cyber-attack and breach which will result in loss to his customers who store their data on their cloud based services.

Since cyber-space has become highly vulnerable, do you believe that some years down the line, there will be a huge surge in such insurance policies?

The cyber insurance market is already flourishing owing to the increase in cyber-attacks. And in the coming years the market is expected to grow at double-digit figure, and a significant surge in demand for cyber insurance policies is also predicted.

Business World

You Might Also Read:

Cyber Insurance Report - 2017/8 (£):

Businesses Need Cyber Insurance – Now:

 

 

« Universities Are Targets For Cyber Criminals
The EU Holds Its First Cyber War Game Exercise »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

iStorage

iStorage

iStorage is the leading global provider of PIN Activated, hardware encrypted, portable data storage solutions.

Digital Detective

Digital Detective

Digital Detective offer a range of products and services for digital forensic analysis and advanced data recovery.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.