Why SMEs Need Cyber Insurance

Almost three-quarters of small and medium-sized businesses have suffered a security breach, and a report from the Federation of Small Business (FSB) says cybercrime targeting small and medium-sized businesses costs the UK an estimated £5.26bn a year. 

The report also notes that it costs small businesses disproportionately more than big businesses, when adjusted for organisational size.

Mike Cherry, National Chairman of the FSB, explains: “Small firms take their cyber security responsibility very seriously, but often they are the least able to bear the cost of doing so. Smaller businesses have limited resources, time, and expertise to deal with ever-evolving and increasing digital attacks.”

Why are smaller businesses a target?

Cyber criminals love smaller businesses because they have more digital assets than consumers, and less security than larger organisations. In fact, the FSB report found that only a quarter of small and medium-sized businesses have a strict password policy, and just 4% have a cyber attack strategy.

Phishing for small business

The most common cybercrimes affecting small and medium-sized businesses are phishing emails, spear phishing emails, and malware attacks. 

Other threats include ransomware (where data is seized and encrypted for ransom), hack attacks (where hackers access the company network), and Denial of Service (DOS) attacks which push a huge amount of data to a company’s website to make it crash.

Phishing emails send you to a website that looks legitimate, and ask you to update your account details. The fraudsters can then easily steal your personal information to commit identity theft.

Spear phishing attacks are even more sophisticated, and harder to spot. They target individuals within the organisation, often mimicking their colleagues, by using email headers and addresses to extort money. 

Statistics from cyber security firm Symantec show more than half of spear phishing attacks last December were against SMEs.

Malware attacks are just as damaging. You might click a link or unknowingly download malicious software designed to infiltrate your computer and steal sensitive information, extort money, or send unwanted advertising (adware).

Spear phishing hooks fishing retailer

Let’s look at a somewhat ironic, real-world example of a cyber-crime event which recently impacted one of our customers. The business, a fishing tackle retailer, was caught out by a spear phishing attack just months after taking out a cyber insurance policy with NIG.

At the time, the company was shopping around for new office space. The account manager received an email from the managing director, asking him to pay £15,000 to a new account, presumably to secure a space. No eyebrows were raised, and the payment was made, however, the email hadn’t come from the managing director. It was sent by a cyber-criminal using a spoof address.

The company quickly alerted the relevant people within NIG. As part of their policy we sent forensic experts to check the fraud came from outside the business, not from an employee, and had the client’s bank put a stop on the account. Their fast action meant only £3,276 was stolen; in part because fraudsters often drip-feed withdrawals in order to avoid detection. The claim was quickly settled, and the retailer could get back to focusing on fishing, and not phishing.

Why take out cyber insurance?

Without cyber insurance, the fishing tackle retailer would have had a different, and far more devastating, experience. After all, the average cost of a cyber breach to small and medium sized businesses is usually between £75,000 and £310,800.

It’s not just stolen funds that business owners have to worry about. There’s also the cost of loss of data and damage to IT systems and networks as well as replacing any stolen or infected devices. There’s the cost of notifying your customers, and in some cases paying compensation, as well as re-building brand confidence through public relations advice and campaigns. 

There’s also investigation and legal costs, money spent responding to regulatory bodies and penalties from banks for losing customer credit card data. On top of all this there is the issue of damaged reputation and lost profit while your system is down. It’s a lot to lose and can often destroy SMEs who don’t have adequate cover in place.

That’s the true value of cyber insurance. It covers you against serious damage, loss of data, and the costs associated with a cyber-attack whilst helping you get back up and running sooner. 

A policy is imperative if your business holds sensitive customer information like names and addresses or bank information, or if you process payments, or do much of your business online. It should also be recognised that your standard business insurance policy probably won’t cover you for cyber-attacks.

It’s clear cyber insurance can minimise the damage caused by a cyber-attack, however, the best policy is to have robust prevention mechanisms in place. This means keeping your IT software and systems up-to-date, training your staff on safe online practices, and implementing formal policies to reduce your risk. 

Putting in place measures such as these, combined with comprehensive cyber coverage, will help keep your business safe from cybercrime.

NIG:

Cybersecurity Breaches Cost UK Businesses £30 billion Last Year:

No Easy Fix For SME Cybersecurity:
 
Cyber Insurance: 7 Questions To Ask:
 
Directors Report January 2017. Cyber Security Checklist For Management (£):

 

« Cybersecurity Breaches Cost UK Businesses Close To £30bn Last Year
Singapore Defense Ministry Under Remote Attack »

Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

WEBINAR: How to build an effective Cloud Threat Intelligence program in the AWS Cloud

Thursday, Jan 28, 2021 - Join this webinar to learn how to improve your Cloud Threat Intelligence (CTI) program by gathering critical cloud-specific event data in the AWS Cloud.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Roke Manor Research

Roke Manor Research

Roke Manor Research is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM)for IoT devices, including Raspberry Pi and other single board computers.

Atonomi

Atonomi

Atonomi provides IoT developers and manufacturers with an embedded solution to secure devices with blockchain-based immutable identity and reputation tracking.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.