• Latest
  • Trending
#HowTo: Evaluate Your Cyber Insurance

#HowTo: Evaluate Your Cyber Insurance

January 25, 2022
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Thursday, 19 June, 2025
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

#HowTo: Evaluate Your Cyber Insurance

by ITECHNEWS
January 25, 2022
in Leading Stories, Opinion
0 0
0
#HowTo: Evaluate Your Cyber Insurance

Businesses depend on access to their data and critical software – but with ransomware attacks at an all-time high, these resources are increasingly under threat. As threat actors continue to take aim at foundational aspects of a business (e.g., web hosts and content management systems), cyber insurance is one of the most critical investments an organization can make.

 

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

However, it’s clear that traditional insurance is not equipped to cover the loss or corruption of data. It’s not enough for cyber insurers to passively use a paper policy that sits on the shelf, year after year. Instead, organizations should look for an insurer that not only keeps their business safe and operational during and after a cyber incident, but also proactively helps them manage cyber risk. Here’s how to do it.

 

Look for Providers Who Help Manage Your Risk

 

One of the biggest misconceptions about stopping cyber threats is that it’s just a technology challenge. As a result, the widely-accepted approach has been throwing more technology at the problem – from access controls, firewalls, sandboxing to EDR (Endpoint Detection And Response) tools. While these tools play an important role in cyber prevention and mitigation, ransomware is a risk management problem at its core.

 

There is no industry better positioned or more incentivized to help customers manage and mitigate their cyber risk than the insurance industry. A good cyber insurance provider goes beyond paying claims and actively helps policyholders identify, manage and reduce white-hot areas of cyber risk.

 

Just like property insurance underwriters provide engineering evaluations of policyholders’ buildings, cyber insurers should set clear standards for a minimum viable level of security, along with the support to help businesses reach those standards, by:

 

  • Evaluating a prospective policyholder’s cyber hygiene free of charge, then identifying any required patches or policy and technology changes needed to reduce risk.
  • Sharing materials to educate a policyholder’s employees about phishing, ransomware and other security threats where widespread compliance and cooperation is essential.
  • Investing in proactive monitoring and control technologies for policyholders to identify security threats and vulnerabilities in real time.

 

By investing in proactive monitoring technologies and cyber education, cyber insurers help customers monitor their risk exposure and improve the resiliency of their security technologies. Strong cyber insurance partners also continuously monitor threat actor activity and guide policyholders on the latest threat intelligence, such as identifying exposure points along a company’s supply chain and providing instructions for timely remediation. Providing this guidance plays a critical role in helping policyholders improve their cybersecurity posture and preventing claims in the long run.

 

Prioritize Third-Party Protection

 

A major exposure point for companies, especially small and mid-sized businesses, is the risk that third-party technologies, like MSPs, public cloud providers and other SaaS applications introduce. Recent ransomware attacks have exploited these platforms to spread through organizations and commit maximum damage. A good cyber insurance partner helps customers understand the full scope of their risk across their business and close critical security gaps that could expose sensitive data to third parties (and vice versa).

 

To address third-party risk, businesses can either mitigate it, transfer it to another entity or accept it. If a policy doesn’t cover third-party platforms and applications, the business is self-insuring for that peril, whether they know it or not. A responsible cyber insurance provider will monitor these potential threats and continuously observe whether the whole ecosystem is resilient against potential attacks.

 

Ask cyber insurers to walk through what level of coverage and threat mitigation they can provide for an entire IT ecosystem; this is key to preventing future claims.

 

Commit to Comprehensive Coverage

 

Many insurers are restricting their coverage for cyber incidents by introducing widespread coinsurance provisions – requiring policyholders to pay a fixed percentage – and other terms that increase expenses. Comprehensive coverage is essential, but with many insurers adding loopholes to reduce coverage, it doesn’t mean what it used to.

 

To provide comprehensive coverage, cyber insurance needs to return to reasonable rates and high-quality, proactive protection and claims mitigation services for business interruption from all cyber events. This includes ransomware, other forms of cyber extortion and data breaches. The right provider will also account for the increasing occurrence of state-sponsored attacks on businesses – rather than leaving them in the lurch.

 

At a minimum, confirm that a cyber-insurer’s rates are sustainable and that the terms for coverage provide enduring support for risk management and future claims.

 

Conclusion

 

Identifying the best cyber insurance on the market requires confirming that a provider’s digital and risk mitigation capabilities can actively prevent threats and provide support in case of a cyber-attack. A static, passive management policy won’t be effective in raising a businesses’ cyber resilience or preventing claims long term. By investigating the scope and technical strength of a cyber-insurer, businesses can identify truly comprehensive coverage for risk prevention.

Source: Michael Carr head of risk engineering (US & Canada), Coalition
Tags: Cyber Insurance
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version