{"id":7718,"date":"2012-07-19T21:02:55","date_gmt":"2012-07-20T01:02:55","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=7718"},"modified":"2021-07-21T16:16:03","modified_gmt":"2021-07-21T20:16:03","slug":"cyber-insurance","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/cyber-insurance\/","title":{"rendered":"Cyber Insurance"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98192 size-medium\" title=\"Cyber Insurance\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/UmbrellaRisk-e1563746782812-150x129.jpg?resize=150%2C129&#038;ssl=1\" alt=\"Cyber Insurance\" width=\"150\" height=\"129\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/UmbrellaRisk-e1563746782812.jpg?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/UmbrellaRisk-e1563746782812.jpg?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/UmbrellaRisk-e1563746782812.jpg?resize=768%2C662&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/UmbrellaRisk-e1563746782812.jpg?w=799&amp;ssl=1 799w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>John Moccia with <a title=\"Innovation Guard\" href=\"https:\/\/web.archive.org\/web\/20230127203933\/http:\/\/innovationguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Innovation Guard<\/a> wrote a good primer on what happens when a firm needs to buy cyber insurance in a thread at <a href=\"https:\/\/web.archive.org\/web\/20140301214902\/http:\/\/www.internetevolution.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Internet Evolution<\/em><\/a>. The author writes that loss control\/security precautions are built into the process of acquiring cyber insurance. There are firms like <a title=\"NetDiligence\" href=\"https:\/\/www.netdiligence.com\" target=\"_blank\" rel=\"noopener noreferrer\">NetDiligence<\/a> that partner with insurers. Apparently, when you buy a <a title=\"Guard Your Company's Cyber Data\u2014Fiercely \" href=\"https:\/\/web.archive.org\/web\/20150812200500\/http:\/\/one.aon.com:80\/guard-your-companys-cyber-data%E2%80%94fiercely\" target=\"_blank\" rel=\"noopener noreferrer\">cyber insurance policy<\/a>, the coverage is contingent upon a successful <a title=\"Security audit\" href=\"http:\/\/searchcio.techtarget.com\/definition\/security-audit\" target=\"_blank\" rel=\"infosec noopener noreferrer\">security audit<\/a> performed by <a title=\"eRisk Hub\u00ae portal\" href=\"https:\/\/www.eriskhub.com\/poweredby.php\" target=\"_blank\" rel=\"noopener noreferrer\">NetDiligence<\/a> (<a title=\"Penetration testing\" href=\"https:\/\/en.wikipedia.org\/wiki\/Penetration_test\" target=\"_blank\" rel=\"noopener noreferrer\">penetration testing<\/a>, ethical hack, etc).<\/p>\n<p><a href=\"https:\/\/betanews.com\/2013\/11\/15\/cyber-security-insurance-grows-in-popularity\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98196 \" title=\"Cyber Insurance\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC-lifesaver.jpg?resize=110%2C110&#038;ssl=1\" alt=\"Cyber Insurance\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC-lifesaver.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC-lifesaver.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/PC-lifesaver.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>The article goes on to state that when a company outsources their technologies, such as with a co-hosting facility where their actual servers reside, the insurer will seek information on the Colo firm&#8217;s security protocols, protection, and redundancy. In the end, those companies with better procedures\/protections in place will get better rates\u2026..those with worse or no security will get higher rates &#8211; or not be afforded coverage at all.<\/p>\n<p>There are first and third-party implications to Cyber insurance according to Mr. Moccia.<\/p>\n<p style=\"padding-left: 40px;\"><strong>The first party<\/strong> = your losses\u2026such as the cost to notify the thousands or tens of thousands of people whose info has been compromised.<\/p>\n<p style=\"padding-left: 40px;\"><strong>Third-Party<\/strong> = losses of others where they would seek restitution from you. A class action claim for failure to secure confidential data &#8211; defense costs, settlements, etc.<\/p>\n<p>This whole area is still evolving. Some insurers offer just third-party, others offer both. They have different approaches to the way they offer the coverage&#8217;s, too. For example, while one insurer may offer you up to $250K for breach notification costs, another provides coverage for up to 2 million affected people with no specific dollar amount.<\/p>\n<p>Coverage can be incorporated on some insurer&#8217;s policies to address the acts of &#8220;rogue&#8221; employees\/insiders.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20151129143516\/http:\/\/www.overstock.com:80\/guides\/best-binoculars-for-stargazing?\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98187 \" title=\"Read the fine print\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Readthefineprint-e1563746431492-118x150.jpg?resize=110%2C140&#038;ssl=1\" alt=\"Read the fine print\" width=\"110\" height=\"140\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Readthefineprint-e1563746431492.jpg?resize=118%2C150&amp;ssl=1 118w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Readthefineprint-e1563746431492.jpg?resize=59%2C75&amp;ssl=1 59w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Readthefineprint-e1563746431492.jpg?w=272&amp;ssl=1 272w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>The author points out that the insurance industry is a very old industry. It is also one that is slow to change its ways of doing business. Insurers package their policies the way they want to sell them, as opposed to the way people\/businesses want to buy them. For example, the types of claims that we are discussing here are relevant and likely for any kind of company today. General Liability claims are very uncommon and unlikely (at least for vanilla office-based companies, like Tech businesses and professional service companies)\u2026and traditional business interruption coverage doesn&#8217;t address these cyber issues. Yet, these coverage&#8217;s are part of the standard policy that all businesses carry. In order to get the total protection that a business needs, it has to buy several policies, usually from multiple insurers. The first progressive insurer that is willing to incorporate coverage for these modern exposures (even if they just dip their toe in the water\u2026 offer $10K or some other nominal amount!), as part of what is their standard <a title=\"Commercial policy\" href=\"http:\/\/en.wikipedia.org\/wiki\/Commercial_policy\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">commercial policy<\/a>, will have a huge advantage on the rest of the market.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I am sure that many SMB organizations have holes in their coverage when it comes to their cyber insurance. I really doubt that they can pass the security audit. Many of the organizations I deal with have very low-security postures. Conversations about password policies, document retention, and user account life-cycle are a big deal, even when my counterpart has come from industry to industry to education.<br \/>\n<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/trustedchoiceexaminer.wordpress.com\/2012\/07\/06\/downside-of-online-cyber-crime-stolen-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">Downside of Online: Cyber Crime &amp; Stolen Data<\/a> (trustedchoiceexaminer.wordpress.com)<\/li>\n<\/ul>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Insurance require firms to successfully pass security audits, penetration testing, ethical hack to be issued a policy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[2197,1795,32,1819,849,604,1848,951,4],"class_list":["post-7718","post","type-post","status-publish","format-standard","hentry","category-business","tag-2197","tag-breach","tag-business","tag-computer","tag-data","tag-insurance","tag-liability","tag-pii","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=7718"}],"version-history":[{"count":13,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7718\/revisions"}],"predecessor-version":[{"id":130755,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/7718\/revisions\/130755"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=7718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=7718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=7718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}