Insurance: How Cyber Risks Are Evolving

The warnings couldn’t be clearer: Both the costs and the ways companies can be targeted by cyber attacks is increasing. A Lloyd’s report produced in association with KPMG, law firm DAC Beachcroft, and Lloyd’s insurers revealed how cyber attacks are constantly evolving. 
 
For instance, professional services firms like lawyers or accountants are now being targeted more as a means to get to their big clients. The report also noted significant financial losses amid a major growth in targeting companies through CEO fraud. It turns out that retail is increasingly being targeted as well by organised cyber crime.
 
As for the infamous ransomware and distributed denial-of-service attacks, businesses with healthcare are the likely victims, with media and entertainment also becoming a particular target. Meanwhile, telecommunications and the public sector are highly susceptible to cyber-attacks focused on espionage.
 “Insurers are used to helping clients protect themselves against risks that stay relatively constant, year on year. Cyber risk isn’t like that: it morphs and evolves at a rapid pace. To take just one example, we saw ransomware attacks against our clients more than quadruple last year and we expect them to double again in 2017,” said Paul Bantick, senior cyber underwriter at Beazley.
 
The report cited 4 aggravating factors for the damage caused by cyber-attacks:
  • higher penalties for breaching cyber-security rules as set out in forthcoming European legislation
  • victims being more willing to sue firms that have lost their data
  • increased responsibility for cyber security in the supply chain
  • greater vulnerability through the increased use of connected devices
As for costs, the full amount involves not only the immediate ones but also what is called the “slow-burn” costs or those associated with the long-term impacts of a cyber-attack. 
 
Lloyd’s said examples include the loss of competitive advantage and customer churn. These slow-burn costs can easily inflate final bills when added to immediate costs such as legal fees and extortion payouts.
 
Insurance Business
 
You Might Also Read: 
 
Advice For Cyber Insurance Buyers:
 
SMEs And Cyber Insurance:
 
« Self- Drive Vehicle Are Confused by Kangaroos
Islamic State On The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

AppRiver

AppRiver

AppRiver is a global provider of cloud-based email and web security solutions that protect businesses worldwide from today's ever-changing online threats.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

OXITS

OXITS

OXITS provides end-to-end IoT security, authenticating device communications, protecting code, applications and securing devices from threats.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Riddle&Code

Riddle&Code

Riddle&Code combines the security of smart cards with the potential of Bitcoin Technology and the Internet of Things (IoT) to help master the challenges of our digital society.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.