Cyber Threats Are The Top Insurance Risk

Cyber insurance is evolving fast as the incidence of data breaches from insider and malicious external threats have become more prevalent. Just a few years ago, cyber insurance was considered important because of data breach concerns and protecting organisations’ liability if private data was exposed. Today, the focus is on the potentially huge losses stemming from cyber-crime.

Research carried out by the  UK insurance firm Gallagher polled 1000 UK business leaders in organisations of various sizes and nearly two-fifths (39%) cited cyber-attacks as one of their biggest concerns. Of these, 82% reported  they do not have specialist insurance.

The shift in the number one cause of loss is a result of both the growing sophistication of cyber criminals’ attack methods as well as businesses’ ability to adapt to cyber threats. It calculated the average number of attacks aimed at a single business last year was 576,575, around 152% higher than the 281,094 recorded in 2018 and the highest since the ISP began analysing this kind of data in 2016. 

A few years ago, credit card breaches at retailers like Home Depot, with 56 million cards compromised, and Target, with 41 million cards compromised, were making headlines. Today, the number of credit card breaches in the news has dropped off, and that’s because businesses have learned their lesson and adopted end-to-end encryption, among other controls. 

Now criminals set their sights on phishing emails, which entice users to click on suspicious links and provide crucial information, and business email compromise, where criminals impersonate employees and management to convince other employees to wire money to nefarious accounts.

Cyber risks have evolved even further. The range of businesses that can become victims of ransomware is broad. In one example highlighted a recent analysis carried out by the Tokio Marine insurance firm, an assistant restaurant manager downloaded an email attachment that looked like a spreadsheet from her manager on to the restaurant’s computer. 

Unfortunately, the file contained the Ryuk virus, which blocked access to the operating system and encrypted all the files on the computer.  A message appeared on the computer notifying the manager that the system and all files were encrypted and would only be unlocked if he paid a ransom of more than $200,000 using Bitcoin.

The higher levels of ransom increasingly being demanded by hackers to restore data is a notable trend and insurers are sensitive to the soaring costs of a successful ransom attack. 

Insurance Business:       Infosecurity:      Reinsurance News:       Infosecurity:     Gallagher Insurance:     CyberCureMe:

You Might Also Read:

Paying Cyber criminals A Ransom Will Double Your Recovery Costs:

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured:

 

« Inside The Deep & The Dark Web
Twitter Is Trying To Control Propaganda »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

689cloud

689cloud

689Cloud is a cloud content collaboration platform that allows users to protect, track, and control files AFTER they have been shared.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

Clearvision

Clearvision

As an Atlassian Platinum Solution Partner, Clearvision works with teams in the UK and US, providing solutions for the Atlassian stack, Git and open source tooling.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

Datos Insights

Datos Insights

Datos Insights is a leading global provider of insights, data, and advisory services to the financial services, insurance, and retail technology industries.