Risk In CyberSecurity: How Prepared Are The Insurers?

Many insurers of today are focused on ransomware risk protection even though other new vulnerabilities are emerging from remote work. The new class of crimes could result in claims damages that may amount to much more than a single ransomware situation.

Some recent statistics point to a troubling increase in ransomware and phishing, web application attacks, and other emerging cybercrime tactics.

How can this be resolved or prevented?

A new approach to cybersecurity risk prevention

Companies can regain control over cybersecurity risks with robust management processes, outlined here in six main steps (and a seventh bonus step):

  1. Assess your risks
  2. Prioritize your risks
  3. Determine your risk profile
  4. Choose your risk strategies
  5. Execute your risk strategies
  6. Measure residual risk
  7. Repeat Steps 1–6 all over again since things are constantly changing

Managing cyber-risk follows the same basic process and principles as managing any other risk; however, the best risk management plans are only as strong as their weakest link. When it comes to cybersecurity, that weak link is often a business’ third-party vendor.

Hiring an expert or external consultant, purchasing password protection software, backing up your files, and enabling multi-factor authentication are some quick and easy ways to ‘lock the door’ to cybercriminals.

But, as ransomware and other attack vectors become more lucrative and easier to initiate, companies of all sizes will need to implement additional, more layered security measures, especially if they’re working with third parties that are equally at risk.

Companies should start by taking inventory with a thorough gap assessment of personnel and capabilities and find a way to address any discrepancies with either an internal expert or an external consultant or both, depending on needs. Next, companies should prioritize which risks are worse than others and develop a continuity plan to manage them and recover if disaster strikes.

To cover losses when an incident inevitably occurs, companies should purchase or shore up their cybersecurity insurance policies as well as requiring that their third-party partners (e.g., suppliers, vendors, contractors, franchisees, etc.) carry a certain amount of cybersecurity coverage to pay for damages and the cost to remediate them.

How insurance verification helps
It’s not enough just to carry cybersecurity coverage — companies need to make sure the policies are adequate and haven’t lapsed. This is where verification, and ongoing re-verification, of third-party cybersecurity insurance, comes into play. This simple measure is one of the most effective ways for businesses to protect themselves and their customers from the financial risk of stolen data, ransomed files, and more.

Additionally, many cyber insurers now verify a company’s cyber-risk controls as part of the underwriting process, so the act of verifying cybersecurity insurance can add a second layer of verification in one. This ensures that not only do third-party vendors have coverage but that they’ve prioritized cybersecurity protection and developed a comprehensive plan of defense.

If the digital pandemic has taught us anything, it’s that nobody and no business is immune from an attack. Companies need to be better about verifying their supply chains and ensuring that each vendor they’re working with is sufficiently covered.

Data breaches are inevitable, but businesses can and should protect themselves and their customers from third-party risk by verifying that their partners’ cybersecurity and ransomware insurance policies are active and appropriately meet the company’s needs.

Inmediate is an insurtech startup from Singapore that is using the latest technology such as Artificial intelligence, Distributed Ledger, and NLP, making insurance processing and underwriting fast, cheap, and flexible. That gives for better processes, lower costs, improved time to market, and new revenue opportunities.




Introducing Inmediate: a platform on which customers, distributors and insurers using smart contracts connect. https://inmediate.io

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How To Prevent Downtime and Protect your Data from all types of Disasters

No more spy apps and hacker attacks. 10 secure online programs

Email Spoofing :

SHA-3: Keccak, Grøstl, Blake, SHAKE and Skein — The Final Versions

How IPFS peer nodes identify each other on the distributed web

{UPDATE} Indoor Soccer Futsal 2019 Hack Free Resources Generator

Google Spreadsheet API without OAuth 2.0?

A user logging in on his smartphone with SheetDB logo on the left.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Introducing Inmediate: a platform on which customers, distributors and insurers using smart contracts connect. https://inmediate.io

More from Medium

People are interested in protecting personal data, although some deny it

#025: The Chip Shortage

What are the top 3 focus areas for automotive OEMs to be successful in the next 10 years?

Automotive Startups — Controlling gears of Mobility’s road ahead.