The impact of a security breach can be extremely detrimental, causing significant business interruption and leading to complex forensic and legal matters. As a result, cyber insurance has emerged as a critical component of any organisation’s risk management strategy. This article will explore the current scenarios surrounding cyber insurance, discuss essential cyber cover must-haves, and discuss key considerations and solutions to ensure comprehensive cyber protection.
The Current Scenario
The landscape of cyber risks is constantly evolving, necessitating organisations to remain vigilant in assessing their cyber risk exposures and management strategies. It is crucial to understand the latest trends in cyber-attacks and the tactics employed by external threat actors, to ensure effective defense mechanisms. Cyber risks are not limited to external threats but also encompass risks arising from within, such as employee negligence or malicious intent. With the rise of remote workforces, businesses must adapt their strategies to mitigate the increased cyber threat. | The insurance industry is facing a significant impact due to the escalating risk of cyber-attacks. Global projections by Cybersecurity Ventures indicate that cybercrime is set to reach an astounding $10.5 trillion annually by 2025, a substantial surge from $3 trillion in 2015. As a result, cyber insurance premiums are on the rise, and insurers are exercising greater caution in selecting the risks they take on due to capacity. |
Cost of Cybercrime in Australia
The Australian Cyber Security Centre reported receiving over 76,000 cybercrime reports between July 2021 and June 2022, equating to a cybercrime report every seven minutes.” These numbers highlight the pressing need for robust cyber risk management strategies.
The financial implications of cybercrime are significant. The average cost per cybercrime report has surpassed $39,000 for small businesses, $88,000 for medium-sized businesses, and exceeded $62,000 for large businesses—an alarming 14% increase on average.
“The Australian Cyber Security Centre reported receiving over 76,000 cybercrime reports between July 2021 and June 2022, equating to a cybercrime report every seven minutes.”
| Additionally, cyber-attacks can have far-reaching consequences, damaging a company’s reputation and resulting in legal liabilities. Compliance with data protection regulations, such as the Australian Privacy Act, further underscores the importance of effective cyber risk management.
Even professional organisations with reasonably mature cybersecurity programs are not immune to cyber-attacks. In the past year, highly established organisations including Medibank, Optus, HWL Ebsworth and Woolworths have been caught up in substantial data breaches, and the list continues to grow daily. According to the Office of the Australian Information Commissioner Notifiable Data Breaches Report: July to December 2022, 497 notifications were issued, up 26% compared to the previous period.
It’s interesting to note that the sources of data breaches were predominantly 350 (70%) malicious or criminal attacks, 123 (25%) human errors, and 24 (5%) system faults.
|
Directors’ Duties Apply to Cyber
In line with the Corporations Act, directors and officers carry a fiduciary responsibility to manage risks, including cyber risks. Failure to do so can result in significant financial losses, reputational damage, and potential legal action. It is incumbent upon directors and officers to ensure the implementation of robust cyber risk management strategies and remediation plans . This responsibility also extends to Supply Chain Management, and all organisations whom interact, store or otherwise manage corporate data. | PwC collaborated alongside the World Economic Forum, The National Association of Corporate Directors, The Internet Security Association, and other partners of the WEF to create a set of six agreed-upon principles. These principles have been crafted to aid corporate boards in overseeing a resilient cybersecurity strategy while simultaneously advancing strategic objectives. |
The Value to the Board
For boards and executive leadership, recognising the value of Cyber Insurance is not merely an exercise in risk management but a strategic imperative. Here’s why:
1. Financial Protection: Cyber Insurance provides a financial safety net in the aftermath of a cyber incident. This ensures that the organisation can continue its operations and recover without facing crippling financial losses.
2. Risk Transfer: Cyber Insurance effectively transfers the financial risk associated with cyber threats to the insurer. This means that in the event of a cyber incident, the burden of financial responsibility is shared with the insurance company, relieving the organisation’s balance sheet. | 3. Compliance and Regulatory Support: In an era of evolving data protection regulations, Cyber Insurance policies often come with built-in compliance support. This can assist organisations in navigating the complex landscape of data privacy regulations and avoiding costly fines.
4. Reputation Management: Beyond financial aspects, Cyber Insurance can contribute to effective reputation management. Boards understand that a tarnished reputation can have lasting repercussions. Having insurance in place to cover public relations and reputation management costs is invaluable.
5. Risk Mitigation: Boards can actively participate in risk mitigation strategies by leveraging Cyber Insurance. Insurers often provide guidance on cybersecurity best practices and risk. |
Tightening Cyber Insurance Market
Insurers are adopting a more cautious approach, becoming increasingly selective about the risks they underwrite. Organisations lacking adequate cyber risk management strategies may find it challenging to secure comprehensive cyber insurance coverage. Insurers now seek mature and robust cyber risk management strategies capable of mitigating potential losses.
Cyber & Data/Privacy Risk Management has quickly become the most prominent exposures, especially in the financial / AFSL space where data breaches are unfortunately common.
We refer to the case against RI Advice who were found to have breached their license obligations to act efficiently and fairly when it failed to have adequate risk management systems to manage its cybersecurity risks. | Successfully managing cyber risks requires a comprehensive and proactive approach. It involves integrating cybersecurity into the organisational culture and surrounding oneself with knowledgeable professionals who can provide guidance and support.
“ASIC is strongly encouraging all entities to follow the advice of the Australian Cyber Security Centre and adopt an enhanced cybersecurity position to improve cyber resilience in light of the heightened cyber-threat environment.”
To become an attractive risk for insurers, organisations must demonstrate a mature and robust cyber risk management strategy. This includes implementing best practices, compliance frameworks, and ongoing monitoring to stay ahead of emerging threats. Having good governance, a well-defined cyber risk management plan, and adequate cyber insurance coverage are paramount. Organisations should establish policies, define roles and responsibilities, and ensure ongoing compliance with regulations. A comprehensive cyber risk management plan should be developed, regularly reviewed, and updated to adapt to changing threats . It is no longer the purview to say all security is managed by an IT Support Firm. |
Cyber Risk Management Tips
To effectively address cyber risks, organisations must embrace a minimum level of security, including: |
Multifactor Authentication
Implementing multifactor authentication (MFA) or two-factor authentication (2FA) adds an extra layer of security, preventing unauthorised access to sensitive information and systems. | It requires users to provide an additional level of authorisation, such as a unique code sent to their mobile device, before accessing a system or application. |
Cyber Security Framework
Adhering to a comprehensive cybersecurity framework, such as essential 8 principles provides organisations with a systematic approach to managing cybersecurity risks. | These frameworks help identify and prioritise risks, establish policies and procedures, and implement controls to mitigate vulnerabilities. |
Zero Trust Architecture
Embracing a Zero Trust Architecture is crucial in today’s cyber landscape. This cybersecurity model assumes that all users, devices, and networks are untrusted. | It requires continuous verification of identity, authorisation, and authentication before granting access to any resources, reducing the risk of unauthorised access and lateral movement within the network. |
Vendor Risk Management Programme
Third-party vendors can introduce potential vulnerabilities, making it essential to have a robust vendor risk management program. This program enables organisations to identify, assess, and manage risks associated with their vendors. | It ensures that vendors comply with cybersecurity requirements and have adequate controls in place to protect sensitive data. |
Effective Incident Response Plan
Having a well-defined incident response plan is crucial for minimising the impact of a cyber-attack. This plan outlines the steps an organisation should take in the event of a security incident, including detecting, containing, and mitigating the effects of the breach. | An effective incident response plan can help reduce downtime, minimise data loss, and facilitate a quicker recovery. |
Security Awareness Training for Staff
Employee negligence or malicious intent remains a significant cyber risk. Providing comprehensive security awareness training equips employees with the knowledge and skills to identify and report suspicious activities. | Regular training ensures that employees understand their role in protecting sensitive data and helps create a culture of cybersecurity within the organisation. |
Regular Penetration Testing Schedule
Penetration testing, also known as ethical hacking, simulates real-world cyber-attacks to identify vulnerabilities and weaknesses in an organisation’s systems. | Regularly conducting penetration tests allows organisations to identify and address potential vulnerabilities before malicious actors exploit them. |
Reliable Data Backup and Process Plan
Data backups are crucial for recovering from a ransomware attack or other data loss incidents. | Organisations should establish a reliable data backup strategy that includes backup testing, regular backups, risk appraisal and offsite storage to ensure data integrity and facilitate recovery in the event of a cyber incident . |
Take Action Today
In an increasingly digital landscape, cyber insurance is an essential tool in protecting businesses from the devastating consequences of cyber-attacks.
By embracing cyber cover must-haves and implementing robust cyber risk management strategies, organisations can strengthen their defenses and mitigate potential losses. Working with experts like KBI ensures access to tailored cyber insurance solutions and valuable guidance throughout the process. Don’t leave your business vulnerable to cyber threats—take action today to safeguard your digital future.
At KBI, our expert brokers understand the unique risks businesses face. We provide guidance, assist with the submission process, and offer a clear breakdown of available options when it comes to the insurance market. | In the event of a claim, our experienced team works alongside insurers and incident response teams to ensure a smooth process. The insurers we work with in the cyber market offer 24/7 emergency incident response at no extra cost, helping you mitigate the impact of a cyber event and get back to business.
Contact KBI today to discuss your insurance needs and secure a tailored program that safeguards your organisation. |
Table of Contents
|
|
Remote Work Fuels Cybercrime
Cybercrime has been around since 1834 — when hackers breached the French Telegraph system and accessed stock market data. Since the 1830s, technology has developed exponentially, and so has cybercrime.
In a survey by McAfee, two-thirds of responding companies experienced a cyber incident in 2019. The average reported cost for each company’s most expensive breach was over $500,000.
Since 2019, the rise of remote work has only fuelled the fire. According to the Australian Cyber Security Center, cybercrime reports rose 13% in FY2020-21. Head of the Australian Cyber Security Center, Ms Abigail Bradshaw CSC, commented: | As we shifted online to go school work or work from home or buy things, or keep communicating, the criminals have also shifted and really prosecuted our online lives to make money or steal our information.
A recent Open VPN poll supports this statement. Among respondents, 73% of VP and C-Suite level IT managers believed that remote workers pose a greater cyber-security threat than on-site workers.
Companies need to accept that they are constantly exposed to the very real and increasing threat of cybercrime, and that cybercriminals are proactively and constantly trying to find ways to attack unprepared victims. |
Key Cyber Risks Businesses Are Facing Now
If your business is reliant on computers to function, a cyber-related business interruption can have a massive impact on turnover. In extreme cases, malicious attacks can hinder your ability to generate income for weeks or even months.
In 2022, cybercriminals are more vicious and dexterous than ever before. And, as businesses trade static workstations for a more ‘fluid office’ the threat of cyber-attacks has increased exponentially. Today, even organisations with advanced security and firewall technology are at the mercy of cybercriminals.
Key cyber risks include:
1. Inadequate passwords:
2. Phishing assaults
Like password-related hacks, phishing attacks take advantage of human error. What makes phishing so effective is that through the social distribution of links and files, victims often inadvertently propagate malicious content.
3. Malware
4. Trojan viruses
5. Crytopjacking | 6. Ransomware and extortion Ransomware can be described as malware’s nastier cousin. Ransomware encrypts your files in a way that is nearly impossible to remove without the necessary software codes. Organisations can be held to exorbitant ransoms to free their systems and data. Although ransomware has been around for many years, 2021 saw increased ransomware complexity. New trends include:
The risks associated with these threats are different for individuals and businesses.
Password breaches: The scale of a password breach is generally larger for a business than an individual. An organisation-wide breach can compromise the classified data, personal information or even bank accounts of thousands of clients.
Phishing: The impact of phishing depends on what information is accessed by the hacker. Individuals tend to be targeted for identity theft, while businesses tend to be targeted for bank account access.
Malware: Malware can result in the total loss of company data, or company client lists with costs running into the millions.
Ransomware: Ransomware attacks are by far the costliest. And unfortunately, they are becoming increasingly more frequent. According to Coverware, in the first quarter of 2021, there was a 43% increase in the demands from cybercriminals, averaging an extortion cost of $220k. This cost is exclusive of productivity loss, loss of system and network access, data loss, damage to brand reputation, client loss and loss of revenue. Extortion costs aside, the IT manpower and hours required to solve these onslaughts, is enormous. They can easily take weeks, if not months, to resolve and run into millions of dollars.
The below chart shows cybercrime statistics for the 20/21 financial year. It is a good indication of how prevalent cybercrime is in Australia at the moment. |
Cyber Business Interruption – The Costs
Most businesses are aware of potential expenses related to repairing operating systems, regaining system access and addressing data breaches following a cyber attack. But, many overlook a critical exposure: business interruption.
An attack related outage can cost your business thousands in lost profits and unexpected expenses. In a survey by McAfee, in 2019 the average length of a responding business’s longest cybercrime-related interruption was 18-hours. For more than 33% of respondents, attack-related system downtime cost between $100,000 and $500,000. | Cyber business interruption examples:
In 2017 the LA Times reported that a NotPetya worm attack interrupted business at Danish shipping company Maersk for two weeks at a cost of $200-$300 million.
According to Computer Weekly, a 2020 cyber-attack left Avon representatives in several countries unable to place orders. Parts of the Avon UK system remained down more than a week after the incident. |
Mitigating Your Cyber Risk & Cyber related business interruptions
In addition to understanding the risks, and insuring against them, it’s probably most important to ensure companies are preparing for, and mitigating key risks. CT Group has provided a list of tactics all businesses should undertake to manage and reduce their exposure to the growing threat of cybercrime:
|
|
What Is Cyber Business Interruption Insurance?
Cyber insurance is a package of coverages that respond to losses associated with a cyber attack. The package can include cover for:
In some — but not all — cases, your cyber policy may include business interruption cover, which is arguably one of its most important coverage sections. Similar to traditional loss events like fire or flood, having insurance to restore operations following a cyber event is only useful if the business is able to survive through the restoration period. | The intention of cyber business interruption cover is to cover the revenue you would have earned if you had not experienced the cyber event. It can also cover additional expenses incurred to continue operating as best you can while the insurers help you recover from the loss.
If your Cyber policy does not include cyber BI cover, it is strongly recommended that you either add it to your existing policy or seek an alternative policy with more comprehensive coverages.
Unfortunately, organising Cyber BI cover is not simple. As a new and evolving form of insurance, cover terms can differ from insurer to insurer, and understanding what is best for your businesses can be confusing. |
What Does Cyber BI Insurance Cover?
The insurance market has not yet settled into a standard way of covering cyber business interruption, which means policy terms can vary significantly between insurers.
➤ Loss of income
➤ Operating expenses
➤ Additional expenses | Your policy may also include or have an option to add:
➤ Forensic expenses
➤ Contingent business interruption (also called dependent business interruption.) |
How Is Cyber Business Interruption Loss Calculated?
The way income loss is calculated will depend on your insurer and your policy. The process often includes consultation with forensic accountants and technology experts.
Some things worth noting are:
|
|
What Might a Cyber Business Interruption Claim Look Like?
It’s really difficult to say what a Cyber BI claim will look like. Terms vary significantly from insurer to insurer. And, since the settlement is often put together at the discretion of a forensic accountant. Some fictitious and slightly simplified examples of claims are below. These can help you to understand some different aspects of cover – but should not be considered representative of an actual claim. Example 1.
Situation:
Your Policy:
Result: | Example 2:
Situation:
Your Policy:
Result: |
Ensuring Your Policy Is Fit-For-Purpose
Especially for complex policies like cyber business interruption, it would be extremely beneficial to work with a specialist broker who can properly review your requirements and align the best solutions to them. | A specialist insurance broker will also:
|
Final Takeaways
| Should you need more information on Cyber Insurance, please contact the KBI team on 1300 907 344 or visit our cyber insurance page
Should you need more information on Cyber Security, please contact the CT Group team on 1300 434 237 or email solutions@ctgroup.com.au |
Disclaimers
All information on the document is provided in good faith, and while significant care has been taken to ensure the information is conveyed in the intended manner, we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability or completeness of any information on the document. | Under no circumstance shall we have any liability to you for any loss or damage of any kind incurred as a result of the use of the document or reliance on any information provided on the document. your use of the site and your reliance on any information on the site is solely at your own risk. |
External Links Disclaimer
The Site may contain (or you may be sent through the Site) links to other websites or content belonging to or originating from third parties or links to websites and features in banners or other advertising. Such external links are not investigated, monitored, or checked for accuracy, adequacy, validity, reliability, availability or completeness by us. | WE DO NOT WARRANT, ENDORSE, GUARANTEE, OR ASSUME RESPONSIBILITY FOR THE ACCURACY OR RELIABILITY OF ANY INFORMATION OFFERED BY THIRDPARTY WEBSITES LINKED THROUGH THE SITE OR ANY WEBSITE OR FEATURE LINKED IN ANY BANNER OR OTHER ADVERTISING. WE WILL NOT BE A PARTY TO OR IN ANY WAY BE RESPONSIBLE FOR MONITORING ANY TRANSACTION BETWEEN YOU AND THIRDPARTY PROVIDERS OF PRODUCTS OR SERVICES. |
FAQs
➤ In most cases, cover is limited to a privacy or security breach. But, there are some situations where extended coverage is available for other outages.
➤ Your insurer will only be responsible for covering lost profit and additional expenses for the period agreed on in your policy. This period differs significantly from insurer to insurer, and the option you pick can drastically affect your position in the event of a claim.
Some typical timeframe based limitations include:
|
➤ Many policies expect the insured to cover a portion of losses. This can be called the retention, excess, deductible, or waiting period, and it might be defined as losses within a period of time, a dollar amount, or both. Like most things in Cyber BI insurance, retention details vary significantly from policy to policy.
Common Cyber BI retention terms include:
There is no one-size-fits-all rule. The type of cover that is right for you will depend on many factors, including your operations, your operating costs, your cash flow, the complexity of your systems, and your core vulnerabilities. In our opinion, the best option is always to consult an expert broker.
Even among companies in the same industry, needs can vary:
Take a 24-hour outage for an online store. Some stores are confident that customers will come back the next day, while others are not. Some stores will lose a single order per customer, while others will lose months of subscription or follow-up purchase income. |
Overview: The Australian Ransomware Action Plan
The Australian Ransomware Action Plan builds on existing cybercrime prevention measures, including education campaigns and support services. The Minister of Home Affairs, The Hon Karen Andrews MP, says:
The Morrison Government is taking action to disrupt, pursue and prosecute cybercriminals. Our tough new laws will target this online criminality, and hit cybercrooks where it hurts most – their bank balances. | The newly proposed measures include: Source: Minster for Home Affairs |
Overview: Underwritten or Oversold — The CSCRC’s Policy Paper on Cyber Insurance
The CSCRC is a government-funded organisation that undertakes cybersecurity research in collaboration with relevant industry members, academics and the government. CSCRC CEO Rachael Falk co-authored their paper on cyber insurance. She says:
This policy paper explores a number of issues related to cyber insurance, with a focus on how it can hinder and help cyber security uplift across the Australian economy, | The paper’s key findings are: |
Why has the CSCRC suggested a ban on ransomware payment cover?
The CSCRC argues that insurers are “unintentionally feeding the ransomware epidemic” by providing ransomware payment cover. Falk says:
We believe the payment of ransoms by insurers is helping drive the illicit ransomware trade – what is vital when it comes to ransomware and cyber insurance is that we start to starve out the cyber criminals and break the payment chain by stopping insurers paying the ransom. | The report also argues ransomware payment cover may lead organisations to be lax about cyber security. |
Is banning ransomware cover the answer?
Since the CSCRC released their paper, questions have been raised around the efficacy and fairness of banning ransomware payment cover. Objections to banning ransomware payment cover can include: |
Tailoring Insurance Programs to
Association Needs
i. Insurance is not always a deciding factor in ransom payment decisions
A 2021 IDC survey suggested that 43% of Australian businesses would “probably pay” a “widespread ransomware attack” that “significantly hampers” operations, even if insurance was not in place
ii. There are other effective ways that insurers can encourage businesses to take cyber protection seriously. Several other ideas mentioned in the CSCRC’s report encourage businesses to step up their cyber policies without removing insurance protection. Examples include requiring businesses to meet a minimum cyber security standard before having insurance, offering insurance premium incentives for solid security practices and providing free risk assessment tools. | iii. Banning ransomware payment cover will take the option of paying a ransom off the table for some businesses. The Ransomware Action Plan makes it clear that the Australian government does not condone ransomware payment. But it does not go as far as making payment illegal.
For many businesses paying a ransom demand is the only realistic option available. This includes organisations who fail to recover their systems in other ways, who are at risk of bankruptcy unless they take immediate action, and who experience attacks on systems critical to the immediate personal safety of their staff or customers.
|
Is a ban on ransomware payment cover likely?
“It’s hard to say,” explains KBI’s lead cyber insurance broker Tyler Speers. He notes that Australia is not the only country looking into this sort of ban. He says:
As the cost and frequency of ransomware attacks grows, the risks associated with providing ransomware cover have begun to push the risk appetite of many insurers. As brokers, we are beginning to see restrictions on ransomware payment cover in Australia. Internationally some insurers, like AXA France, have voluntarily ceased ransomware payment cover, but it is unclear how other insurers will respond to these changes.
For insurers who have enacted (or are considering enacting) limitations on ransomware cover, a market-wide ban would help ensure their policies will not lose competitiveness. However, not all insurers will necessarily share this view. | For concerned businesses, Speers adds that the best thing to do is strengthen your cyber security policies.
We don’t know how the cyber insurance market will change over the next 12 months. But there are three things we do know. Firstly, changes are likely. Secondly, changes will almost certainly favour businesses with robust cyber protections and ransomware attack plans in place. And thirdly, in any circumstance, the best way to prevent issues with ransomware payment is to prevent attackers from gaining access to your systems in the first place. |
How do I protect my business from a ransomware attack?
The CSCRC suggests that a best practice Cyber Security Checklist for SMEs include: | KBI suggest that you also have |
What should my incident response plan include?
A good ransomware incident response plan helps you respond quickly to cyber attacks by providing clear and detailed instructions for dealing with an attack.
We suggest that your plan incorporate:
|
|
Key takeaways
|
To talk to a broker, or find out more about cyber insurance, visit our cyber insurance page. |
At a glance: The OAIC January–June 2021 Notifiable Data Breaches Report
Top 5 Industry Sectors to notify data breaches
Sources of data breaches
Cyber Incident Breakdown
|
|
The OAIC urges Australian businesses to maintain adequate privacy procedures
Throughout the report and subsequent press release, the OAIC reinforced the expectation that businesses:
This expectation extends to the threat of ransomware attacks and impersonation fraud. The Australian Information Commissioner and Privacy Commissioner Angelene Falk says:
We expect entities to have appropriate internal practices, procedures and systems in place to assess and respond to data breaches involving ransomware. Entities should continually review and enhance their security posture to minimise the growing risk of impersonation fraud. | OAIC recommendations for preventing and responding to ransomware and identity fraud risks included:
|
KBI recommends businesses seek cyber insurance
When commenting on the report, Commissioner Faulk acknowledged the rise of the dark web and the increasing ease with which cybercriminals can bypass entities’ impersonation fraud protection measures.
This is part of the reason that KBI’s lead cyber insurance broker Tyler Speers recommends pairing robust privacy protection measures with an equally robust cyber insurance policy: | Strong cyber security policies and procedures can reduce your business’ risk of a cyber attack. But, they cannot remove that risk altogether. Cyber attacks can and do have significant financial repercussions for the businesses targeted. If your business is targeted, a cyber insurance policy can help cover costs associated with privacy lawsuits, regulatory defence, extortion demands, notification, and data recovery. It will also give you access to an emergency incident response team to put the situation in the hands of the experts.
Given the growing risk of ransomware and impersonation fraud, Speers recommends that all businesses who hold personal data seek cyber insurance. He also suggests that businesses with an existing policy have a proactive conversation about risks and cover requirements with their broker.
|
KBI predicts changes to the cyber insurance market in FY22
Increases in the number of ransomware and impersonation attacks could result in tighter underwriting criteria for cyber insurance policies in FY22, as well as harsher terms for cover. “We are already beginning to see policies that limit cover for ransomware payments,” says Speers. | Government legislation in response to the growing threat of ransomware attacks is also a possibility. In June, Tim Watts, a federal Labour MP, introduced the private member’s Ransomware Payments Bill 2021. If passed, this bill would require businesses to report ransomware demands to the Australian Cyber Security Center. |
Key takeaways
| To talk to a broker, or find out more about cyber insurance, visit our cyber insurance page. |
Table of Contents
1. Callback Procedures 2. Multi-Factor Authentication for Devices and Applications 3. Automatic Updates and Patching 4. Daily Backups | 5. Two Factor Payment Authorisation 6. Device Security 7. Lost or Stolen Personal Device Procedure 8. Social Media Security Policies |
1. Callback Procedures
This is by far one of the best things you can do to prevent cybercrime.
We’ve all seen them – an email asking you to pay an invoice or change bank details from an apparent client or trusted individual. These schemes (phishing) are getting much better all the time, so it’s important to put procedures in place to mitigate against these losses, even when it’s near impossible to identify the fraudulent emails from the legitimate ones.
A call-back procedure is when you verify requests to pay an invoice for the first time or alter bank details by calling a trusted person at that company.
Step 1
Step 2 | Step 3 DO NOT do this by responding to the request email itself or contacting a number included in the request email. The request email may be coming from fraudsters pretending to be from the familiar company/person or that company/person’s email address may be compromised.Step 4 It is recommended that you have a register of representatives for suppliers/vendors/others for you to contact and verify any of these changes.Many cyber insurance policies now require you to have call-back procedures in place before you can purchase the Social Engineering section of the policy, so this really is a must-have. |
2. Multi-Factor Authentication for Devices and Applications
This is another must-have and was referenced by the Australian government as one of the best things you can do to protect your company (and person) from a cyber security breach.
It is simple to get started and most systems have this functionality already – you’re probably already doing it for a lot of them. The standard way of doing this is by making it so you need both a password and SMS code to login to an account or system.
| This can be facilitated through each application with the help of your IT provider. See this article from the Australian Government for tips on implementing multi-factor authentication procedures:
Australian Government – Implementing Multi-Factor Authentication |
3. Automatic Updates and Patching
If you set up your applications/accounts right, this is a “set & forget” way of keeping your security controls up to date.
Software updates are more than the glamorous changes to the operating system on your phone – software companies (Microsoft, Apple) use “automatic updates” as bug fixes and security patching to ensure security is up to date and any errors or holes are fixed as soon as possible. By turning on this feature, your devices and applications will automatically update to keep your device/network secure. | This article from the Australian Government outlines the importance of automatic updates and how to turn them on:
Australian Government – Step by Step Guide: Turning on Automatic Updates |
4. Daily Backups
This is something that most leading systems will already feature automatically (i.e. outlook, salesforce), but it is recommended that you liaise with your IT team and application service providers to ensure all company data is backed up at least once a day. | If a cyberattack occurs, your data should be able to be recovered easily. Most businesses have back-up procedures in place already, but it is common that these are less frequent, such as weekly back-ups or even monthly. A lot can change during a week or month – the tools are available and not normally cost prohibitive, so why not make sure everything is up to date should the worst occur? |
5. Two Factor Payment Authorisation
This is a common risk prevention procedure used to stop fraud/crime but is also relevant for cybercrime. It is another procedure that most insurers require to provide the relevant cover (i.e. crime section of a policy). | Payments made to vendors, either across the board or at a certain dollar amount, should be processed and/or authorised by at least two company representatives (i.e. accounts team & director). This not only prevents one individual from going “rogue”, but also acts as an extra check stop to prevent an accident or miscommunication – often the reason a social engineering loss occurs. |
6. Device Security
Device security is one of the more common cyber risk management procedures and most of us will already have these on our personal items, but it is just as important to make sure these are implemented on your business devices.
|
|
7. Lost or Stolen Personal Device Procedure
Most of us have lost an electronic device in some capacity, whether it was personal or business related. If it’s a business device, what should you do to protect important company information?
|
|
8. Social Media Security Policies
If your business uses social media (LinkedIn, Facebook, Instagram) you should have some kind of policy in place as a security control. A standard social media policy should include:
|
This article from the Australian Government provides some useful tips for social media security policies:
Australian Government – Security Tips for Social Media |
What are some other ways to prevent cyberattacks?
Policies and procedures are only part of the solution. Training staff, leveraging technology and other preventative measures are significant in protecting your company from cyberattacks. | See our recent article for 10 ways to prevent a cyberattack. |
What happens if a cyberattack occurs anyway?
You can take every possible step in preventing a Cyber Attack and one may still occur. Therefore, it’s important to manage this risk by putting a Cyber Insurance policy in place. | See our recent article explaining what to do following a cyberattack, including tips on creating a 7-step plan: |
Looking into a cyber insurance policy?
Here’s an article we’ve written about what a cyber insurance policy does and why you need it: |
As long as you have a stable internet connection, you can still log into the company systems and work from the comfort of your own home. This has a number of benefits, including cutting down commuting hours, providing flexibility for employees, and allowing a business to continue operating if the office space is suddenly unusable. This sense of remote working has never been more prevalent, as thousands are being asked to do so in the midst of the COVID-19 spread this month.
However, it is important to remember that your home computer likely does not have the same level of cyber security in place as your work equivalent. Savvy businesses will always have some form of cyber security measures in place to protect important files and to keep criminals out. | This may come in the form of antivirus software, firewalls, two-factor authentication, and more. Whereas, unless you have actively downloaded similar measures onto your home system, you may find yourself far more vulnerable when working remotely. These vulnerabilities are often magnified even further when working on the road, as you open yourself up to unsecured and shared Wi-Fi networks.
Over half of all employees across the globe are now working outside their main office for at least 2.5 days per week. Over 80% of employees asked said they would always choose a job with remote working opportunities over one that had none. 85% claim that productivity has increased due to the flexibility provided by remote working. However, despite all this, almost half of businesses are concerned about data security in relation to remote working. |
Table of Contents
1. Treat your home computer as you would your system at work 2. Updates and patches will keep your computer protected 3. Always be aware of unsecured Wi-Fi networks while away from the office | 4. Create a working from home security policy for your business 5. Give yourself the best chance with the latest physical security |
1. Treat your home computer as you would your system at work
We can have a tendency to let our guards down, not only when we are in the home environment, but also when we are browsing on our home computers. These systems belong to us, so we do not have the natural feelings of guilt or responsibility that we have when operating expensive machines at work.
However, it would be a mistake to treat your home computer any differently from the one you use within the office setting. | The number one cause for infection on a company system is human error, which only highlights the growing need for improved cyber security practices and education. Chances are when using your work computer, you are careful about the messages, attachments, and links that you open.
You probably do not risk entering unknown third-party sites, especially when warned against doing so by your antivirus system. You should be taking these same exact steps when working from home. Remember, it isn’t just your personal system you are putting at risk, but the company servers too. |
2. Updates and patches will keep your computer protected
Constant reminders about updating software can be irritating, but it is an absolute necessity in the modern internet age. Software updates and patches are released regularly to ensure that the system not only runs as smoothly as possible, but also that any exploits, vulnerabilities, or possible avenues of attack for cyber criminals are blocked off. | In short, failing to update your system leaves it far more vulnerable to a cyber attack. The easiest thing to do is set your home computer to install updates automatically, that way they will likely download when you are asleep or not using the system in question. |
3. Always be aware of unsecured Wi-Fi networks while away from the office
While the Wi-Fi network within your office building is likely to be secure and encrypted, the same cannot be said for every router you connect to on your travels. If you risk using an unsecured network while working remotely, you risk allowing nearby malicious attackers a route into the company network and systems.
If they successfully find a route in via your connection, they may be able to access all kinds of sensitive information, causing as much damage as they like in the process. | To help protect your network while away from the office, you can invest in a secure home Wi-Fi network which would likely replicate the environment you have at work. You can also use a “Virtual Private Network” (VPN) connection when working on the go, which is a program used to hide your network data while online. |
4. Create a working from home security policy for your business
Many businesses have work-from-home security policies in place to help prepare themselves and their employees for mitigate cyber security issues while working remotely.
Here is our 10-point guide for simple steps to set up your own policy: | 1. Create strong passwords for all accounts, computers and mobile devices 2. Don’t use the same password for work and personal accounts 3. Set up Two-Factor Authentication (i.e. password and phone number) 4. Use antivirus software 5. Install patches and updates (i.e. automatic updates) 6. Partake in training on identifying phishing email scams 7. Regularly back up your data 8. Make sure that all communication is encrypted 9. Make sure that your Wi-Fi router is secure 10. Use a Virtual Private Network (VPN) connection |
5. Give yourself the best chance with the latest physical security
In simple terms, the more modern the technology, the better the physical security included will likely be. Outdated computers can carry outdated software, much of which will not be affected by the latest patches and updates. | Ensure that your system is up to date and capable of fighting the cyber threats of today! |
Cyber Events are unique in that they are usually random – they tend to target any company, regardless of size or industry. | Cyber Insurance losses/coverages are split into two categories: First-Party and Third-Party: |
Cyber Insurance Claims Examples
Social Engineering – Vendor Email Hacked
The controller for a distributor of component parts was responsible for making regular payments to overseas vendors from which the distributor purchased products for resale in the United States. After many months of working with one particular vendor and receiving regular shipments, the controller received an email that appeared to come from his vendor contact, indicating that the vendor’s bank was having issues with accepting payments, and asking if the next payment could be made to a new bank. Due to the vendor’s overseas location, verification was a challenge. After the supposed vendor applied some pressure, the controller paid the invoice via wire transfer. | The following month, when the real vendor realised that its best customer’s payment was overdue, an investigation determined that the vendor’s email had been hacked, and an imposter had been socially engineering the company into believing that the change in bank information was authentic. In the end, the fraudster stole almost $250,000 from the distributor through this cyber attack.
** This claims example has been provided by Chubb Insurance Company of Australia Limited ** |
Privacy Breach, Fines & Investigation (First Party & Third-Party Claim)
An IT company misplaced multiple drives that contained personal information for over one million customers. It was unknown whether the drives were lost, stolen or destroyed. The IT company was required to notify the affected individuals, as well as the privacy regulator. The regulator investigated the incident and fined the company for failing to have appropriate safeguards in place to protect customer information. | The company incurred legal fees of $1,000,000 in connection with the regulatory investigation and defending legal actions brought by affected customers and for the costs and expenses in notifying customers their personal information had been lost, stolen or destroyed. The company was also fined $75,000 by the privacy regulator. The total loss to the company exceeded $5,000,000.
This type of scenario triggers multiple Insuring Clauses under a typical Cyber Liability Insurance policy, including privacy fines and investigations. |
Data Breach
Users of the Insured’s online network had reported that they had received spam emails from an individual they knew to be an ex-employee of the Insured, to a unique email address that they had created exclusively for use on the Insured’s website. Investigations confirmed that while working for the Insured, the ex-employee had access to the relevant customer databases and forensic IT investigations confirmed the data breach. | Steps were taken to ensure that the ex-employee deleted the data and signed an enforceable undertaking not to use the data in future. The quick action to contain the breach and engage with the regulator meant that the regulatory investigation could be responded to in a way that satisfied the regulator and the costs and risk could be contained. |
Ransomware
A professional services company was affected by cryptolocker virus identified as the Lockey virus. A network of 20 computers were affected with users unable to access files, which had been encrypted. Investigations revealed the virus entered the computer network via an infected email attachment which had been inadvertently opened by an employee. | An IT specialist was approached to re-build and restore lost data from the back-up server. The IT costs involved in containing and recovering from the incident were claimed under the Cyber Insurance policy. No ransom was paid as a result of the data recovery efforts. |
Employee Error (First Party & Third-Party Claim)
A retailer emailed a group of customers to promote a sale with special discounts available to them. The retailer intended to attach a copy of the flyer detailing the discounts but instead attached a copy of a spreadsheet that contained a customer list, including customer names, addresses and credit card information. The retailer was required to notify all affected customers of the error and offered credit monitoring services.
Several of the affected individuals began legal proceedings against the retailer. The notification costs and credit monitoring costs totalled $50,000, and the amount to settle the legal proceedings with the retailer’s customers combined with the associated legal costs and expenses totalled $100,000. | Most Cyber Risk Insurance policies provide coverage for breach of privacy which includes legal costs, indemnification of third parties and crisis management costs.
** This claims example has been provided by Chubb Insurance Company of Australia Limited ** |
DDOS – Distributed Denial of Service
An online service provided was hit by a Distributed Denial of Service (DDoS) attack – a type of cyber incident that can be covered by insurance. The DDoS attacks effectively starved the web site host system of resources by flooding it with malicious traffic and preventing legitimate customers logging on or accessing the website. Account Customers utilising the Internet, Mobile Phones and Mobile Apps were unable to log on, new users were unable to set up accounts. | A specialist forensic IT vendor was appointed to investigate and mitigate the attack. The incident involved serious disruption to the insured’s business and loss of income as a result of its website being down for approximately one week at one of the busiest times of the year. The Cyber Security Insurance policy responded to the costs of the IT investigation and remediation and the loss of profits suffered.
** These claims examples have been provided by AIG Australia Limited, Chubb Insurance Company of Australia Limited, and Insurance Australia Group Limited ** |
1. Disclosure of Information Before & During the Policy Period
Someone applying for insurance must disclose any matter they know to be relevant to the insurer’s decision to accept the risk. | Continuous disclosure is also very important: if there is any material change to the company during the policy period, the insured needs to keep the broker/insurer informed of the change. |
2. Cancelling a Policy
Cyber Insurance policies are written on a claims made policy form, which means the loss/claim must be reported and indemnity granted during the period of insurance to trigger a claim. If a policy is cancelled and a claim is reported afterwards, the claim will likely be denied – even though you may have had a policy in place at the time the loss actually occurred. | An example of this situation is if your system is breached while you have a policy in place, but you aren’t made aware of any loss/attack until later. If you had a policy in place when the breach occurred, but cancelled it before you were made aware of the loss, the claim would likely be denied. This can be more likely than one would think, as cyber criminals can breach a system (take control, install malware/ransomware, etc.) months before they decide to take any sort of action that notifies you of the attack. |
3. Social Engineering Coverage
This is an important coverage, as Social Engineering losses are more frequent than ever, but this section is typically automatically excluded from a policy unless it is specifically added and noted on the schedule for an additional premium.
This coverage is also often misunderstood and lumped under the term “Cyber Crime” – this is incorrect. Cyber Crime is a very broad term that can include sections that are almost always automatically covered, such as Cyber Extortion. Social Engineering has recently been defined more adequately as Funds Transfer Fraud, which is the fraudulent transfer or theft of funds caused by instructions made by a person purporting to be an authorized employee, outsourced provider or customer of yours. This also covers off the definition of “phishing”, which would be included in this section. | This coverage is typically optional for an additional premium and is sub-limited. To see if your policy includes this coverage, it should be detailed on the policy/quotation schedule and further explained in the policy wording. |
4. Retroactive Date & Known Claims
The retroactive date determines if a policy will provide cover for past acts that have only been discovered after the fact – in the policy period. If this date is either “unlimited” or states a specific date, there is cover for claims that had occurred in the past and reported during the policy period, as long as they were not previously known by the insured. | If this date is “inception”, then cover is only provided for acts occurring after the policy is put in place while it is in force. |
5. Exclusions
Cyber Specific Exclusions
** The above are general examples only; each insurance policy is different and standard exclusions may apply. Please read your PDS and contact your insurance advisor to review your specific policy. ** | Standard Exclusions
** The above are general examples only; each insurance policy is different and standard exclusions may apply. Please read your PDS and contact your insurance advisor to review your specific policy. ** |
Cyber Insurance provides cover for financial loss and expenses that businesses may suffer as a result of a Cyber Event, including cyber attacks from malware or other invasive software, cyber extortion and social engineering. | Claims covered under a Cyber policy are very broad, but are typically three core things: Liability (privacy lawsuits and regulatory defence), Internal Financial Loss (extortion, notification expenses, data recovery, business interruption, crime/theft), and Emergency Incident Response (costs incurred from responding to a Cyber Event). |
A Cyber Event triggers a claim on a Cyber Insurance policy and can be caused by several different scenarios:
What are the Coverages Available?
Main Coverages that respond to a Cyber Event:
1. Privacy Breach Notification & Crisis Management Costs
When a cyber incident occurs, whether it is through some kind of invasive software (malware, ransomware), phishing or social engineering scheme, or other form of cyber attack, there is usually a privacy breach as a result – i.e. private or confidential information/data is exposed. This policy section provides cover for the costs associated with responding to a privacy breach, including: |
|
2. Privacy & Security Liability
This section protects you from claims/lawsuits as a result of a privacy and security wrongful act, such as:
|
|
3. Cyber Extortion
Cyber extortion is defined as a threat against the insured computer system to provide ransom in order to prevent a Cyber Attack. | Coverage for this can include: the payment of a ransom, negotiation & mediation costs, crisis management costs & costs to resolve a security threat, and investigation costs to determine the cause of the extortion threat. |
4. Business Interruption – Loss of Profits & Operational Expenses
Coverage for loss of profits and additional operating expenses incurred because of a cyber event. |
5. Data Recovery & System Damage
This section covers the costs and expenses for lost, damaged or destroyed IT systems, records, and data. | This can include the retrieving, repairing, restoring or replacing of data or systems, including the removal of malware. |
6. Regulatory Defence and Fines
This section provides cover for defence costs and regulatory fines that have resulted from a cyber incident, such as a privacy or security breach. |
7. Media Liability
Coverage for the following incidents that occur from your information through traditional and digital media:
|
|
Additional Coverage Sections and Policy Options:
1. Social Engineering & Funds Transfer
The fraudulent transfer or theft of funds caused by instructions made by a person purporting to be an authorized employee, outsourced provider or customer of yours. | This coverage is typically sub-limited. |
2. Contingent Business Interruption
Coverage for loss of profits and additional operating expenses incurred as a result of an interruption to a dependant business/supply chain partner, caused by a cyber event. |
3. Payment Card Data Security Liability
Coverage for loss of profits and additional operating expenses incurred as a result of an interruption to a dependant business/supply chain partner, caused by a cyber event. |
What is a Cyber Attack or Data Breach?
A cyber attack is usually associated with some sort of event that causes a loss, such as the outbreak of malware or other invasive software, cyber extortion or ransomware, and social engineering. A cyber event can also cause a data breach, which is defined as when personal information an organisation holds is lost or subjected to unauthorised access or disclosure. | Companies are encouraged to do everything in their power to prevent a cyber attack from ever occurring, but these are inevitably going to happen to most companies at some point – 1 in 4 companies experience a cyber attack at least once according to recent statistics. This is why it is necessary to have some kind of cyber incident response plan; or at least an idea of what to do if you experience a cyber attack or data breach. |
7 Step Plan on What to Do Following a Cyber Event
1. Identify The Breach
This may seem like an obvious step, but cyber breaches often occur without the victim even noticing – sometimes sitting in your system or on your computer for months before an actual attack occurs. Identifying the breach can be as simple as training staff to recognise a breach when it happens, to implementing sophisticated breach prevention software. | No matter how this is done, it is important to identify a breach quickly, so you can respond to it right away. Once you’ve realised that a breach has occurred, you’ll need to identify what has happened and proceed to the next step – at this point you can contact your incident response team. |
2. Contact Incident Response Hotline
Who do you call in the event of a cyber attack? | One of the main reasons we recommend purchasing a Cyber Insurance policy is because it gives you immediate access to a 24/7 emergency hotline, so you have somebody to call in the event of a breach. This puts you in touch with experts who can sort out the problem efficiently and effectively – and the policy will pay for their services if the claim goes through. |
3. Contain The Breach
At this point you have identified the breach, and if you have a cyber insurance policy, contacted the nominated incident response team; now you need to contain the breach, so it doesn’t get any worse. This step is typically handled by the incident response team or your internal/external IT team.
There will be certain steps the IT team (yours or the one nominated by the emergency response team) will take to restore your system’s security and resolve the breach; this can include: |
This can be a complicated process, which is why it’s important to have access to the specialists who can handle the situation appropriately and mitigate the problem before it potentially gets too severe. |
4. Investigate The Breach & Assess The Impact
You have contained the breach, but still don’t know what exactly happened and the extent of the damages. This is when you would typically utilise a forensic IT specialist to dig into the cause and effect of the cyber event. | Once the forensic IT has identified what occurred and the scope of the breach, you’ll be able to plan from there on how to respond to the event. |
5. Recover Data & Systems
Once you have contained and eradicated the breach, you can begin the process to recover your IT networks, systems, and data to continue operating. Companies with a business continuity or disaster recovery plan would likely have a specific recovery plan incorporated for these types of situations. However, even if you don’t have a formal plan, your process should include the following: |
This is something your IT team should be able to assist with.
|
6. Communication & Notification
This step relies heavily on timing – it is important to hold off on certain communication (i.e. with clients, service providers, or those affected by the breach) until you know what exactly happened and the scope of the damages. In addition, you may also have specific notification requirements that will have associated timelines – we recommend you are aware of these in advance, to avoid missing deadlines and getting hit with fines and penalties.
This depends on the impact of the cyber incident – sometimes the event doesn’t warrant communication with these parties, in which case it is usually best practice to skip this step. Alternatively, communicating with these parties can be mandatory in certain scenarios and/or vital to your business. It is important to identify which of these options apply to your business, which is where your emergency response/crisis management team can assist.
If you are going to communicate with these parties, we recommend you wait until you have enough information to pass on a complete message to help avoid miscommunications and misunderstandings. | Consider these key messages when communicating with clients and service providers:
Depending on the size of the cyber event and your business, it may be worth appointing a public relations firm to assist with the communication step.
Certain rules & regulations around mandatory notification of privacy breaches may apply to your company. We recommend you know when to notify before any breach occurs, as you could face fines & penalties if you don’t notify within a specified time period. |
7. Evaluation & Improvement
Use the information gathered in the previous steps to improve your cyber security measures. Not only will this strengthen your defence against future cyber attacks, but it will help your case with insurers when it is time to renew your policy. | See our Top 10 Tips to Prevent A Cyber Attack here for more information on how to prevent a cyber event. |
Tips & Tricks for a Cyber Incident Response Plan
Consider some of the below when establishing your breach response plan:
|
|