Insurance: How Cyber Risks Are Evolving

The warnings couldn’t be clearer: Both the costs and the ways companies can be targeted by cyber attacks is increasing. A Lloyd’s report produced in association with KPMG, law firm DAC Beachcroft, and Lloyd’s insurers revealed how cyber attacks are constantly evolving. 
 
For instance, professional services firms like lawyers or accountants are now being targeted more as a means to get to their big clients. The report also noted significant financial losses amid a major growth in targeting companies through CEO fraud. It turns out that retail is increasingly being targeted as well by organised cyber crime.
 
As for the infamous ransomware and distributed denial-of-service attacks, businesses with healthcare are the likely victims, with media and entertainment also becoming a particular target. Meanwhile, telecommunications and the public sector are highly susceptible to cyber-attacks focused on espionage.
 “Insurers are used to helping clients protect themselves against risks that stay relatively constant, year on year. Cyber risk isn’t like that: it morphs and evolves at a rapid pace. To take just one example, we saw ransomware attacks against our clients more than quadruple last year and we expect them to double again in 2017,” said Paul Bantick, senior cyber underwriter at Beazley.
 
The report cited 4 aggravating factors for the damage caused by cyber-attacks:
  • higher penalties for breaching cyber-security rules as set out in forthcoming European legislation
  • victims being more willing to sue firms that have lost their data
  • increased responsibility for cyber security in the supply chain
  • greater vulnerability through the increased use of connected devices
As for costs, the full amount involves not only the immediate ones but also what is called the “slow-burn” costs or those associated with the long-term impacts of a cyber-attack. 
 
Lloyd’s said examples include the loss of competitive advantage and customer churn. These slow-burn costs can easily inflate final bills when added to immediate costs such as legal fees and extortion payouts.
 
Insurance Business
 
You Might Also Read: 
 
Advice For Cyber Insurance Buyers:
 
SMEs And Cyber Insurance:
 
« Self- Drive Vehicle Are Confused by Kangaroos
Islamic State On The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

Federation of Finnish Technology Industries

Federation of Finnish Technology Industries

The Federation of Finnish Technology Industries is the lobbying organisation for technology industry companies in Finland.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Secure-CAV Consortium

Secure-CAV Consortium

Secure-CAV is a technology-led consortium funded by Innovate UK to drive the development of cybersecurity solutions for connected and autonomous vehicles.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.