WannaCry Drives Cyber Insurance

Newly released data from cyber insurance provider, CFC Underwriting, has revealed that the WannaCry cyber-attack in May was the biggest source of cyber insurance enquiries for the first half of the year. 

In the four weeks following the attack, weekly enquiries dramatically increased by nearly 50%.

Beyond the initial media coverage of WannaCry, headlines continued to report the ongoing impact of the ransomware attack. It was reported that the attack had links to China, and highlighted that it was the biggest ransomware attack the world had seen to date. It is highly likely that sensationalist headlines such as these were behind the sharp and sustained increase in enquiry rates.

Very recently, the possible financial impact of cyber events has also been widely reported, which is no doubt contributing to businesses considering purchasing cyber cover. Lloyd’s of London issued a report recently which warned that a serious cyber-attack could cost the global economy $120bn, as much as catastrophic natural disasters.

At CFC’s annual Cyber Symposium at the end of last year (November 2016), almost a quarter of cyber insurance professionals in attendance (23%) said that the “fear factor” of an impending and costly attack played a significant part in the growth of their cyber book in 2016.

But this “fear” is now being realised by actual significant losses. For example, British consumer goods company Reckitt Benckiser lost an estimated £100 million in the recent NotPetya ransomware attack, and even the smallest firms can face costs in the hundreds of thousands after an attack.

Independent research conducted for CFC earlier this year highlighted the top three elements of cyber-crime that concern small businesses, theft of funds, inability to operate due to system outage, and damage to reputation. Yet 48% still do not have an incident response plan in place.

Graeme Newman, chief innovation officer at CFC Underwriting commented: “We’d expect to see an uptick, but this really was an unprecedented jump and then sustained interest, compared to previous high profile attacks. Much like a physical flood, businesses could see water running down the street and past their front door, prompting them to take action to guard against a similar threat.”
“While headline-grabbing attacks such as these spur businesses into action, we’re no longer living in a world where cyber insurance can be a reactive afterthought.” 
“Security can only go so far in protecting against a cyber event, companies must have the right policy and response team in place should they fall victim to an attack. The value of intangible assets now generally outstrips the value of tangible assets on corporate balance sheets and businesses must be ready for this new wave of crime.”

Information Age:

You Might Also Read: 

Global Cyber Attack Could Cost $53Billion:

Advice For Cyber Insurance Buyers:

 

 

« Hunters Take Down Terrorists On The Internet
8 Major Problems Healthcare CIOs Are Facing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

RiskIQ

RiskIQ

RiskIQ is the leader in digital threat management, providing the most comprehensive discovery, intelligence, and mitigation of threats associated with an organization’s digital presence.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Capula

Capula

Capula is a leading system integration specialist for control, automation and operational IT systems across all applications and industry sectors.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Cyberani Solutions

Cyberani Solutions

Cyberani Solutions was created to fulfill the cybersecurity needs of industry and government in Saudi Arabia, and across the Middle East and North Africa regions.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.