Insurance: How Cyber Risks Are Evolving

The warnings couldn’t be clearer: Both the costs and the ways companies can be targeted by cyber attacks is increasing. A Lloyd’s report produced in association with KPMG, law firm DAC Beachcroft, and Lloyd’s insurers revealed how cyber attacks are constantly evolving. 
 
For instance, professional services firms like lawyers or accountants are now being targeted more as a means to get to their big clients. The report also noted significant financial losses amid a major growth in targeting companies through CEO fraud. It turns out that retail is increasingly being targeted as well by organised cyber crime.
 
As for the infamous ransomware and distributed denial-of-service attacks, businesses with healthcare are the likely victims, with media and entertainment also becoming a particular target. Meanwhile, telecommunications and the public sector are highly susceptible to cyber-attacks focused on espionage.
 “Insurers are used to helping clients protect themselves against risks that stay relatively constant, year on year. Cyber risk isn’t like that: it morphs and evolves at a rapid pace. To take just one example, we saw ransomware attacks against our clients more than quadruple last year and we expect them to double again in 2017,” said Paul Bantick, senior cyber underwriter at Beazley.
 
The report cited 4 aggravating factors for the damage caused by cyber-attacks:
  • higher penalties for breaching cyber-security rules as set out in forthcoming European legislation
  • victims being more willing to sue firms that have lost their data
  • increased responsibility for cyber security in the supply chain
  • greater vulnerability through the increased use of connected devices
As for costs, the full amount involves not only the immediate ones but also what is called the “slow-burn” costs or those associated with the long-term impacts of a cyber-attack. 
 
Lloyd’s said examples include the loss of competitive advantage and customer churn. These slow-burn costs can easily inflate final bills when added to immediate costs such as legal fees and extortion payouts.
 
Insurance Business
 
You Might Also Read: 
 
Advice For Cyber Insurance Buyers:
 
SMEs And Cyber Insurance:
 
« Self- Drive Vehicle Are Confused by Kangaroos
Islamic State On The Internet »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.

Octopus Cybersecurity

Octopus Cybersecurity

Octopus VAR is a Validation, Analysis and Reporting tool that gives risk managers and CISOs a powerful control mechanism and a deep view of operational risks.

Cyber Solutions Inc

Cyber Solutions Inc

Cyber Solutions has been providing professional IT Support for businesses since 1998.