Insurance: How Cyber Risks Are Evolving

The warnings couldn’t be clearer: Both the costs and the ways companies can be targeted by cyber attacks is increasing. A Lloyd’s report produced in association with KPMG, law firm DAC Beachcroft, and Lloyd’s insurers revealed how cyber attacks are constantly evolving. 
 
For instance, professional services firms like lawyers or accountants are now being targeted more as a means to get to their big clients. The report also noted significant financial losses amid a major growth in targeting companies through CEO fraud. It turns out that retail is increasingly being targeted as well by organised cyber crime.
 
As for the infamous ransomware and distributed denial-of-service attacks, businesses with healthcare are the likely victims, with media and entertainment also becoming a particular target. Meanwhile, telecommunications and the public sector are highly susceptible to cyber-attacks focused on espionage.
 “Insurers are used to helping clients protect themselves against risks that stay relatively constant, year on year. Cyber risk isn’t like that: it morphs and evolves at a rapid pace. To take just one example, we saw ransomware attacks against our clients more than quadruple last year and we expect them to double again in 2017,” said Paul Bantick, senior cyber underwriter at Beazley.
 
The report cited 4 aggravating factors for the damage caused by cyber-attacks:
  • higher penalties for breaching cyber-security rules as set out in forthcoming European legislation
  • victims being more willing to sue firms that have lost their data
  • increased responsibility for cyber security in the supply chain
  • greater vulnerability through the increased use of connected devices
As for costs, the full amount involves not only the immediate ones but also what is called the “slow-burn” costs or those associated with the long-term impacts of a cyber-attack. 
 
Lloyd’s said examples include the loss of competitive advantage and customer churn. These slow-burn costs can easily inflate final bills when added to immediate costs such as legal fees and extortion payouts.
 
Insurance Business
 
You Might Also Read: 
 
Advice For Cyber Insurance Buyers:
 
SMEs And Cyber Insurance:
 
« Self- Drive Vehicle Are Confused by Kangaroos
Islamic State On The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Sepior

Sepior

Our vision is to make Sepior the leading provider of cloud-encryption software in the world.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

Skyhawk Security

Skyhawk Security

Skyhawk Security is the originator of Cloud threat Detection and Response (CDR), helping hundreds of users map and remediate sophisticated threats to cloud infrastructure in minutes.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.