Like every business asset we need to insure, our network and security is also an asset we need to be protecting. The data within the network, the operating systems and software, they all need to be viewed as a corporate asset and hence the need for cyber insurance.
The risk of
What do cyber policies typically cover?
Business revenue has always been tied to a product. Today, this is not the case. Revenue is now intrinsically tied to your data, your network, your internet traffic. The ability for clients to access your portal, to access your services, to order products, to engage with your people, are linked to their ability to get on your network. If your network experiences downtime for some unforeseen reason, cyber insurance can provide some level of mitigation against such business income losses.
Say your organization experiences a data breach. You will be held accountable for any PII (personally identifiable information), financial data (credit card information) or healthcare records that are leaked. Potential fines may be levied by anyone who is impacted by the data release. Cyber insurance serves as a financial backstop, up to the limit on the policy and subject to retention limits.
In the event of cyber extortion from a ransomware attack, which can cost upwards of
If you encounter hardware damage that necessitates costly replacement and requires a substantial capital investment, the policy can offer financial support for these expenses. This coverage is commonly referred to as
Many carriers can underwrite for
Key requirements for cyber insurance
Underwriters prioritize revenue when underwriting policies, ensuring that it aligns with the associated data exposure. This involves an evaluation of the type, volume and risk level of the data records in conjunction with the organization's revenue. Based on these assessments, underwriters calculate a rate per million to determine the premium. Additionally, the organization's controls, policies and processes may influence the application of credits during this process. These may include:
Multi-factor authentication: Given that most insurance claims arise through
Endpoint detection and response:
Policies, compliance and procedures: The depth and structure of your current cybersecurity policy, the level of incident preparedness, the state of crisis management procedures, adherence to compliance standards — all these things matter to an insurer and help them judge how mature and serious an organization is about their cybersecurity.
Training and simulation exercises: Having a comprehensive security training program, conducting regular cybersecurity awareness exercises and tabletop exercises, and providing training to employees on responding to and reporting security incidents all contribute to earning credit points with insurers.
Routine vulnerability assessments: Most insurers require policyholders to run vulnerability assessments at regular intervals because cyber threats evolve with changes in technology and changes in attack vectors. How well organizations know their own vulnerabilities and exposures is a clear indication of the level of control they have on evolving risks.
Before committing to a cyber policy it is important that organizations dive deep into the fine-print — the rights, the inclusions, the deductibles, the exclusions, and the carve backs; for example,
See more: