WannaCry Drives Cyber Insurance

Newly released data from cyber insurance provider, CFC Underwriting, has revealed that the WannaCry cyber-attack in May was the biggest source of cyber insurance enquiries for the first half of the year. 

In the four weeks following the attack, weekly enquiries dramatically increased by nearly 50%.

Beyond the initial media coverage of WannaCry, headlines continued to report the ongoing impact of the ransomware attack. It was reported that the attack had links to China, and highlighted that it was the biggest ransomware attack the world had seen to date. It is highly likely that sensationalist headlines such as these were behind the sharp and sustained increase in enquiry rates.

Very recently, the possible financial impact of cyber events has also been widely reported, which is no doubt contributing to businesses considering purchasing cyber cover. Lloyd’s of London issued a report recently which warned that a serious cyber-attack could cost the global economy $120bn, as much as catastrophic natural disasters.

At CFC’s annual Cyber Symposium at the end of last year (November 2016), almost a quarter of cyber insurance professionals in attendance (23%) said that the “fear factor” of an impending and costly attack played a significant part in the growth of their cyber book in 2016.

But this “fear” is now being realised by actual significant losses. For example, British consumer goods company Reckitt Benckiser lost an estimated £100 million in the recent NotPetya ransomware attack, and even the smallest firms can face costs in the hundreds of thousands after an attack.

Independent research conducted for CFC earlier this year highlighted the top three elements of cyber-crime that concern small businesses, theft of funds, inability to operate due to system outage, and damage to reputation. Yet 48% still do not have an incident response plan in place.

Graeme Newman, chief innovation officer at CFC Underwriting commented: “We’d expect to see an uptick, but this really was an unprecedented jump and then sustained interest, compared to previous high profile attacks. Much like a physical flood, businesses could see water running down the street and past their front door, prompting them to take action to guard against a similar threat.”
“While headline-grabbing attacks such as these spur businesses into action, we’re no longer living in a world where cyber insurance can be a reactive afterthought.” 
“Security can only go so far in protecting against a cyber event, companies must have the right policy and response team in place should they fall victim to an attack. The value of intangible assets now generally outstrips the value of tangible assets on corporate balance sheets and businesses must be ready for this new wave of crime.”

Information Age:

You Might Also Read: 

Global Cyber Attack Could Cost $53Billion:

Advice For Cyber Insurance Buyers:

 

 

« Hunters Take Down Terrorists On The Internet
8 Major Problems Healthcare CIOs Are Facing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

Pixalate

Pixalate

Pixalate is an omni-channel fraud intelligence company that works with brands and platforms to prevent invalid traffic and improve ad inventory quality.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

TokenEx

TokenEx

TokenEx Cloud Security Platform protects sensitive data to strengthen our clients' security postures while future-proofing their operations.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.