Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but  is only now becoming  a popular safeguard against hackers.

Cybersecurity insurance is an insurance policy that is designed to help with the losses from a variety of cyber incidents, such as data breaches, business interruption or network damage. Each cybersecurity insurance policy, while similar to another policy, is never exactly the same as other insurance policies.

Almost every industry, from agriculture to healthcare, is using online data for its services. The so-called “Internet of Things” (IoT) — the network connectivity of everyday objects — will lead to new capabilities that could yield a $3 trillion a year economic increase by 2025, according to a McKinsey Report. Businesses have to keep up with the rest of the market and adapt to the online world.

“Cyber Insurance has been around for many years; however, it has been mostly focused on hardware or physical damage as a result of a cybercrime so most companies do not have coverage for data loss even today,” Joseph Carson, director of Global Strategic Alliances at Thycotic, a US.-based cybersecurity firm.

“With more and more companies becoming dependent on IT and data” there has been “a significant change with data becoming more tangible and having significant monetary value where we have seen the likes of Facebook, Airbnb and Uber becoming multibillion dollar companies almost purely based on information and data,” he continued.

Cybersecurity insurance is only one arrow in your quiver used in the protection of your organization’s electronic protected health information (ePHI). It is only one part of your organization’s mitigation and it is important to remember that it is not the solution to a HIPAA security incident or a HIPAA breach event.

There are two general categories of risks and potential liabilities for ePHI breaches, those that happen within your organization and those that happen with one or more of your vendors or business associates. Since there are two categories, your organization should consider purchasing both first-party and third party cybersecurity coverage. With these two types of coverage your organization would be the first-party and your vendors and business associates would be the third parties.

First-party losses may include loss or damage to your organization’s ePHI; corrupted, lost, stolen or ransomed ePHI by loss or stealing of devices or due to a virus; network interruption or denial of service attack, or; the inability to conduct business due to an ePHI breach or loss.

Third party risks include your organization’s liability to its clients or patients, and in various states and on the federal level, regulatory investigations and fines.

What incidents might be covered by insurance?

  • Unencrypted devices
  • ePHI in the control of a third party;
  • Human error, mistakes and negligence;
  • External attacks by cyber criminals;
  • System, data center, or business process failures;
  • Malicious or criminal insiders; and
  • Credit cards.

What benefits, or protections, might be covered by insurance?

  •      Notification costs to data breach victims, media and other;
  •      Legal defense costs;
  •      Forensics and investigative costs;
  •      Regulatory penalties and fines;
  •      Revenue losses;
  •      Third party liability;
  •      Communication costs; and Productivity losses. 

There are also very specifically outlined and defined exclusions in a cybersecurity policy. They often include the following:

  •  Breaches of PHI in paper files;
  •  Claims brought by the government or regulators, including the Office of Civil Rights, the Department of Health    and Human Services, and the Office of a state’s Attorney General, plus various state’s laws;
  • Vicarious liability, for data entrusted to a third-party vendor, when the breach occurs on the vendor’s system;
  • Unencrypted ePHI; and
  • If your organization waits too long to report the event to the insurance company.

The cost of cybersecurity insurance continues to increase, as is the dollar amount deductible that your organization will have to pay up-front before any insurance payments will kick in. The deductible excess is now $25,000.00 on many policies.

Cybersecurity insurance is quickly becoming a necessity for many healthcare organizations, but it is only one piece of an organization’s mitigation. Other parts of mitigation include: a yearly HIPAA Security Risk Analysis/Assessment, a yearly internal or external HIPAA Audit, and a yearly HIPAA Security, Privacy and Breach Training, plus constant, on-going vigilance.

The need for cyber insurance is more urgent as every sector of society becomes more interconnected through internet. “Almost all data has a monetary value,” Carson stated. “Absolutely any company that is helping organizations protect and provide cybersecurity to their business and will help reduce the risk of cybercrime” will reap the rewards.

Conclusion: Your organization must understand all the provisions of the cybersecurity insurance policy before it is signed and paid for.

Litmos:  Daily Caller

« Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS
Brexit Fallout Continues – ePrivacy »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Cloudera

Cloudera

Cloudera provide the world’s fastest, easiest, and most secure data platform built on Hadoop.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Redport Information Assurance

Redport Information Assurance

Redport Information Assurance is an information assurance and cyber security solutions provider offering integrated business solutions for all levels of government.

Labyrinth Technology

Labyrinth Technology

Labyrinth Technology is an IT support company based in London specialising in cyber security for small to medium sized businesses.