WannaCry Drives Cyber Insurance

Newly released data from cyber insurance provider, CFC Underwriting, has revealed that the WannaCry cyber-attack in May was the biggest source of cyber insurance enquiries for the first half of the year. 

In the four weeks following the attack, weekly enquiries dramatically increased by nearly 50%.

Beyond the initial media coverage of WannaCry, headlines continued to report the ongoing impact of the ransomware attack. It was reported that the attack had links to China, and highlighted that it was the biggest ransomware attack the world had seen to date. It is highly likely that sensationalist headlines such as these were behind the sharp and sustained increase in enquiry rates.

Very recently, the possible financial impact of cyber events has also been widely reported, which is no doubt contributing to businesses considering purchasing cyber cover. Lloyd’s of London issued a report recently which warned that a serious cyber-attack could cost the global economy $120bn, as much as catastrophic natural disasters.

At CFC’s annual Cyber Symposium at the end of last year (November 2016), almost a quarter of cyber insurance professionals in attendance (23%) said that the “fear factor” of an impending and costly attack played a significant part in the growth of their cyber book in 2016.

But this “fear” is now being realised by actual significant losses. For example, British consumer goods company Reckitt Benckiser lost an estimated £100 million in the recent NotPetya ransomware attack, and even the smallest firms can face costs in the hundreds of thousands after an attack.

Independent research conducted for CFC earlier this year highlighted the top three elements of cyber-crime that concern small businesses, theft of funds, inability to operate due to system outage, and damage to reputation. Yet 48% still do not have an incident response plan in place.

Graeme Newman, chief innovation officer at CFC Underwriting commented: “We’d expect to see an uptick, but this really was an unprecedented jump and then sustained interest, compared to previous high profile attacks. Much like a physical flood, businesses could see water running down the street and past their front door, prompting them to take action to guard against a similar threat.”
“While headline-grabbing attacks such as these spur businesses into action, we’re no longer living in a world where cyber insurance can be a reactive afterthought.” 
“Security can only go so far in protecting against a cyber event, companies must have the right policy and response team in place should they fall victim to an attack. The value of intangible assets now generally outstrips the value of tangible assets on corporate balance sheets and businesses must be ready for this new wave of crime.”

Information Age:

You Might Also Read: 

Global Cyber Attack Could Cost $53Billion:

Advice For Cyber Insurance Buyers:

 

 

« Hunters Take Down Terrorists On The Internet
8 Major Problems Healthcare CIOs Are Facing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Security Affairs

Security Affairs

Security Affairs is a blog covering all aspects of cyber security.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

ENVEIL

ENVEIL

ENVEIL’s technology is the first scalable commercial solution to cryptographically secure Data in Use.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

Macomb-OU Incubator

Macomb-OU Incubator

Macomb-Oakland University Incubator supports startup and emerging companies in the niche industries of defense, homeland security, advanced manufacturing and technology.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards (NCSSS) - India

National Cyber Safety and Security Standards has been started with a great vision to safeguard India from the current threats in the cyber space.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.