Insurance Will Reduce Cyber Losses

The increasingly serious and large-scale nature of cyberattacks is creating problems for companies and clients of all sizes and on all levels.

Organisations face the growing risk of financial loss and reputational damage, while their customers face the prospect of having their personal details fall into criminal hands.

Insurance companies are not coming out of the recent spate of hacks unscathed either. When a big client is successfully targeted, their carrier faces a hefty bill. For insurance companies to avoid finding themselves in deep water after a breach, conducting effective due diligence on prospective cyber clients, especially larger ones, is becoming increasingly crucial.

“The larger the client, the more complex the risk, and the more examination we do on an application for insurance,” says Jeremy Barnett, senior vice president of marketing at NAS Insurance. “We work to really understand what safeguards and policies each company has in place. The underwriting process needs to be more comprehensive when the risk is bigger and doing that due diligence is really important.”

More organisations, both large and small, are realising the importance of preparing for the worst when it comes to a hack. There are a growing number of resources available for companies to assess their ability to manage an attack, and savvy business leaders are beginning to reap the benefits.

As cyber risks spread, insurance companies are stepping up and doing more to help their clients before, during and after an attack. Conscientious carriers have realised that simply providing policies is no longer enough; the modern client requires a more advisory, holistic service.

NAS offers clients access to the resources that will increase their cyber readiness as well as discounts on service providers who can help them train their workforce, evaluate their network vulnerability, and review their incident response, Barnett explains.

“It allows companies to be more prepared, which has benefits on both the technology and the cyber sides,” says Barnett. “We are doing lots of things to help our clients prepare, practice and simulate cyber incidents. The more we can help them be proactive, the less likely they are to have an incident. That also means they are more likely to feel better about their relationship with us.”

Insurance Business:

You Might Also Read:

Cyber Insurance Report 2017 - 2018 (£):

Global Cyber Attack Could Cost $53Billion:

Advice For Cyber Insurance Buyers:

 

« Russian Hacking Fuels Return To Paper Ballots
AI Can Guess Your Password »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

Stronghold Cyber Security

Stronghold Cyber Security

Stronghold Cyber Security is a consulting company that specializes in NIST 800, the Cybersecurity Framework and the Cybersecurity Maturity Model Certification.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.