Are you covered? – Cyber Insurance

You might have read in the news a couple of weeks ago that between 800 and 1,500 businesses around the world were affected by a ransomware attack centred on US IT firm Kaseya, a company that provides software tools to IT outsourcing shops.

The most notable disruption occurred in Sweden, where hundreds of Co-Op supermarkets had to shut their doors because their cash registers were inoperative – and in New Zealand, where 11 schools and several kindergartens were affected.

The hackers who claimed responsibility for the breach have demanded $70 million to restore all the affected businesses’ data,

Cyber Insurance is currently one of the hottest topics in insurance as the pandemic has resulted in more of the workforce working remotely.  However, cyber insurance is still a relatively new market, and can often seem complicated.

Delta Corporate Risk in Macclesfield has over 20 years of experience dealing with corporate risk, and we recently took out additional insurance to deal with the ever-increasing cyber threat.

Many companies are confused about how cyber insurance works and unsure about whether it makes sense for their business, so we asked Delta to write an article to explain what this new and evolving insurance is, and why it is so important for businesses.

Here are six of the most common misunderstandings about cyber insurance:

“We Don’t Need Cyber Insurance, We Have IT Security”…   No matter how much a company invests in IT security, it will never be 100% secure. The purpose of an insurance policy is to respond in the event that the worst happens.

Not purchasing a cyber policy because you have ‘good IT security’ is akin to suggesting that you don’t need theft cover on a property policy because you have high-quality locks on your doors.

There is a big difference between vulnerability and risk.  While a client that has invested heavily in IT security may be less vulnerable to certain types of cyber-attack than an organisation that has invested very little, they still have a risk exposure.  Cyber threats are rapidly evolving and there are a plethora of ways in which attackers can access networks.  Even large corporations that spend vast amounts of money on IT security every year still get hit.

People are often the weakest link in an organisation’s IT security chain.  According to IBM, 95% of successful cyberattacks and incidents are the result of human error.  Technology and training may reduce the likelihood of an employee accidentally clicking on a malicious link in an email, or being tricked into transferring funds to a fraudster as part of a social engineering attack, but it can’t eliminate those risks completely.

And no amount of investment in IT security can stop employees from leaving their laptops on a train or a rogue employee from releasing sensitive data on the internet.

“We Outsource All Of Our IT, So We Don’t Have An Exposure…” Even if you outsource your IT, the chances are you’re still liable.  Assuming you’ll be successful in claiming back damages from a third party is a gamble.

Using a third party for IT might change your exposure, but it does not eliminate it.  If an organisation outsources their data storage to a third party and that third party is breached, they could be forgiven for thinking that responsibility for notifying affected individuals and dealing with any subsequent regulatory actions that may arise would rest with the breached third party.

But that’s generally not the case.

If an individual has entrusted their personal data to an organisation, it is the organisation that is responsible for looking after that data, regardless of whether or not a third party is utilised to look after it. If that data is lost or stolen, then it is the organisation that will be accountable for any notification requirements, regulatory investigations, fines or penalties that do arise, and it will be their reputation that suffers, not the third party’s.

Of course, it isn’t just breaches of data at outsourced IT providers that could leave businesses exposed.  Many businesses rely on third parties for business-critical operations, and should those providers experience a system failure, it could have a catastrophic effect on the company’s ability to trade, resulting in a business interruption loss and additional costs incurred to continue trading.

Claiming back these losses from a third party can also prove to be easier said than done.  Most third-party technology service providers tend to have standard terms of service that completely limit their liability in the event that a breach or system outage causes financial harm to one of their clients.

We Don’t Collect Any Sensitive Data, So We Don’t Need Cyber Insurance…”  Any business that relies on a computer system to operate, whether for business-critical activities or simply electronic banking, has a very real cyber exposure.

Cyber insurance is about much more than data breach and privacy risk.  In fact, two of the most common sources of cyber claims are funds transfer fraud and system damage or business interruption as a result of ransomware.

Funds transfer fraud is often carried out by criminals using fraudulent emails or conducting social engineering over the phone to request the transfer of funds from a legitimate account to their own.  In many cases, fraudsters will pose as a senior executive appearing to give urgent instructions to a junior employee.

Any business that wires money to and from a business bank account is susceptible to funds transfer fraud, and many of the victims of these losses hold next to no sensitive personal data.

“Cyber Attacks Only Affect Big Business. We’re Too Small To Be A Target…”  Cybercriminals target the most vulnerable companies, not just the most valuable.

We’ve all heard about major corporations falling victim to cyber-attacks because they’re reported in the news.  But what you don’t often hear about is the small law firm that transfers £100,000 to a fraudster as part of a social engineering scam or the private hospital unable to use their computer systems for days because of a destructive malware attack.  Just because events like these aren’t reported in the mainstream media doesn’t mean they aren’t happening.

In fact, attacks against smaller organisations are now so frequent they are no longer newsworthy.  A recent Verizon report found that 58% of victims were categorised as small businesses.  Claims data shows that 95% of funds transfer fraud claims, the largest source of claims by number, come from businesses with revenues under £100 million.

Cybercriminals see smaller organisations as low-hanging fruit because they often lack the resources necessary to invest in IT security or provide cybersecurity training for their staff, making them an easier target.

“Cyber Is Already Covered By Other Lines Of Insurance…”  Some overlaps exist (as they do with all lines of insurance), but traditional insurance policies lack the depth and breadth of standalone cyber cover and won’t come with experienced cyber claims and incident response capabilities.

Cyber insurance emerged as a standalone product specifically to fill the gaps that more traditional insurance products have been unable to fill.   Property, crime, and professional liability are three of the most common lines of insurance assumed to include some form of cyber cover, but they often fall well short of the cover found in a standalone policy.

Property insurance policies, for example, have often included some form of sub-limit for data restoration costs, but it was developed as an add-on with narrow cover and property insurers have often lacked the expertise to deal with a claim involving data theft or damage.

Likewise, crime insurance policies have only recently started to give cover for social engineering attacks, but generally speaking, the social engineering coverage on cyber policies is broader and has less onerous terms than a traditional crime policy.

Similarly, some professional liability policies offer limited cover for suits arising from data theft, but these policies do not tend to cover any of the first party costs associated with responding to an event, which can be the most important part in determining how the event unfolds.

So, while there may be elements of cyber cover existing within traditional insurance policies, it tends to be only partial cover at best.  Standalone cyber policies will generally provide broader cover with less onerous terms and are purpose-built for true cyber exposures.

“Cyber Insurance Doesn’t Pay Out…”  The number of cyber claims continues to rise, in terms of both frequency and severity, and insurers are paying them.

Cyber insurance actually has a lower claims declinature rate than most other lines of insurance.

Scepticism around whether cyber insurance pays out often stems from how the product first developed. Cyber insurance was a new and largely untested market, so insurers were nervous and wanted to protect themselves.  As a result, early cyber policies had risk management warranties in place that required insureds to maintain certain controls for the policy to remain valid.  These warranties were often difficult to understand and even harder to comply with, particularly for small business owners, and they would put clients off.

But the market has changed a lot since then. A good cyber policy will now tend to be free from risk management warranties and control-based conditions, meaning that there are unlikely to be any unpleasant surprises when insureds make a claim.

Hopefully, this article has given you a much better idea of what Cyber Insurance is, and why it might be applicable to you.  If you would like to know more then please contact us and we will then pass you on to Delta.

Author

Featured articles
How can a book or a small habit change transform your life?
Feel overwhelmed by investment options?
Yorkshire 3 peak Challenge Completed
Case Study: Estate planning – BPR/Trusts/Wills
Transform Your Financial Destiny: Empowerment Through Education
Investing with Purpose
The Three Peaks Challenge
wealth strategies
Financial Planning Across Life’s Stages: Wealth Strategy Tips for the UK
Mastering Change with The Quantum Programme
Learn to enjoy money
Learn To Enjoy Your Money
Get rich schemes
Are Get Rich Schemes Worth It?
Avoid Pitfalls When Making Financial Gifts
Welcome to Damiene
Welcome to Dan!
foresight bank holiday
Foresight Wealth Strategists Bank Holiday.
Mark Hughes - Charity Bike Ride
Mark Hughes helps to raise over £8,000 for local charity
How Safe Is Your Final Salary Pension?
Financial planning
Mastering Financial Planning Techniques with Foresight: Your Path to Empowerment
Spring Budget 2024
Key Dates in March
Vacancy – Receptionist/Admin person
Children Should Be Saving For Themselves
Tax doesn’t need to be Taxing
Recommended Internet Provider
Get to know: Josh Lenihan, Senior Wealth Strategist
Considering Animals and Pets in your Will
Solidus Achievement of Excellence for Estate Planning 2023
Get to know Mike Barnes
Vacancy – IFA Administrator
A week in the life of…Work Experience
A week in the life of…Work Experience
Foresight Shortlisted for Money Marketing Awards 2023
Can I stop my spouse sharing my inheritance on divorce?
2023 Budget Announcement
Professional Advisor Nominations
Webinar: When is the best time to sell my business?
ISA deadlines for 2023
Vacancy – Client Manager
Pass Go This Christmas: Family Fun with Monopoly and More
Case Study: From IPO to Independence
Simple change in your habits can spark massive growth in your life?
Welcome to Thomas
Case Study: John and Linda’s Financial Success Story

See all blogs by: