strengthening your business with comprehensive cyber insurance solutions 1


The Current Scenario

 

The landscape of cyber risks is constantly evolving, necessitating organisations to remain vigilant in assessing their cyber risk exposures and management strategies. It is crucial to understand the latest trends in cyber-attacks and the tactics employed by external threat actors, to ensure effective defense mechanisms. Cyber risks are not limited to external threats but also encompass risks arising from within, such as employee negligence or malicious intent. With the rise of remote workforces, businesses must adapt their strategies to mitigate the increased cyber threat.The insurance industry is facing a significant impact due to the escalating risk of cyber-attacks. Global projections by Cybersecurity Ventures indicate that cybercrime is set to reach an astounding $10.5 trillion annually by 2025, a substantial surge from $3 trillion in 2015. As a result, cyber insurance premiums are on the rise, and insurers are exercising greater caution in selecting the risks they take on due to capacity.

 

 

Cost of Cybercrime in Australia

 

The Australian Cyber Security Centre reported receiving over 76,000 cybercrime reports between July 2021 and June 2022, equating to a cybercrime report every seven minutes.” These numbers highlight the pressing need for robust cyber risk management strategies.

 

The financial implications of cybercrime are significant. The average cost per cybercrime report has surpassed $39,000 for small businesses, $88,000 for medium-sized businesses, and exceeded $62,000 for large businesses—an alarming 14% increase on average.

 

“The Australian Cyber Security Centre reported receiving over 76,000 cybercrime reports between July 2021 and June 2022, equating to a cybercrime report every seven minutes.”

 

Additionally, cyber-attacks can have far-reaching consequences, damaging a company’s reputation and resulting in legal liabilities. Compliance with data protection regulations, such as the Australian Privacy Act, further underscores the importance of effective cyber risk management.

 

Even professional organisations with reasonably mature cybersecurity programs are not immune to cyber-attacks. In the past year, highly established organisations including Medibank, Optus, HWL Ebsworth and Woolworths have been caught up in substantial data breaches, and the list continues to grow daily. According to the Office of the Australian Information Commissioner Notifiable Data Breaches Report: July to December 2022, 497 notifications were issued, up 26% compared to the previous period.

 

It’s interesting to note that the sources of data breaches were predominantly 350 (70%) malicious or criminal attacks, 123 (25%) human errors, and 24 (5%) system faults.

 

 

Directors’ Duties Apply to Cyber

 

In line with the Corporations Act, directors and officers carry a fiduciary responsibility to manage risks, including cyber risks. Failure to do so can result in significant financial losses, reputational damage, and potential legal action. It is incumbent upon directors and officers to ensure the implementation of robust cyber risk management strategies and remediation plans . This responsibility also extends to Supply Chain Management, and all organisations whom interact, store or otherwise manage corporate data.PwC collaborated alongside the World Economic Forum, The National Association of Corporate Directors, The Internet Security Association, and other partners of the WEF to create a set of six agreed-upon principles. These principles have been crafted to aid corporate boards in overseeing a resilient cybersecurity strategy while simultaneously advancing strategic objectives.

 


strengthening your business with comprehensive cyber insurance solutions 2

Source: World Economic Forum, Principles for Board Governance of Cyber Risk, March 2021. Located on Page 6.

 

The Value to the Board

 

For boards and executive leadership, recognising the value of Cyber Insurance is not merely an exercise in risk management but a strategic imperative. Here’s why:

 

1. Financial Protection: Cyber Insurance provides a financial safety net in the aftermath of a cyber incident. This ensures that the organisation can continue its operations and recover without facing crippling financial losses.

 

2. Risk Transfer: Cyber Insurance effectively transfers the financial risk associated with cyber threats to the insurer. This means that in the event of a cyber incident, the burden of financial responsibility is shared with the insurance company, relieving the organisation’s balance sheet.

3. Compliance and Regulatory Support: In an era of evolving data protection regulations, Cyber Insurance policies often come with built-in compliance support. This can assist organisations in navigating the complex landscape of data privacy regulations and avoiding costly fines.

 

4. Reputation Management: Beyond financial aspects, Cyber Insurance can contribute to effective reputation management. Boards understand that a tarnished reputation can have lasting repercussions. Having insurance in place to cover public relations and reputation management costs is invaluable.

 

5. Risk Mitigation: Boards can actively participate in risk mitigation strategies by leveraging Cyber Insurance. Insurers often provide guidance on cybersecurity best practices and risk.

 

Tightening Cyber Insurance Market

 

Insurers are adopting a more cautious approach, becoming increasingly selective about the risks they underwrite. Organisations lacking adequate cyber risk management strategies may find it challenging to secure comprehensive cyber insurance coverage. Insurers now seek mature and robust cyber risk management strategies capable of mitigating potential losses.

 

Cyber & Data/Privacy Risk Management has quickly become the most prominent exposures, especially in the financial / AFSL space where data breaches are unfortunately common.

 

We refer to the case against RI Advice who were found to have breached their license obligations to act efficiently and fairly when it failed to have adequate risk management systems to manage its cybersecurity risks.

Successfully managing cyber risks requires a comprehensive and proactive approach. It involves integrating cybersecurity into the organisational culture and surrounding oneself with knowledgeable professionals who can provide guidance and support.

 

“ASIC is strongly encouraging all entities to follow the advice of the Australian Cyber Security Centre and adopt an enhanced cybersecurity position to improve cyber resilience in light of the heightened cyber-threat environment.”

 

To become an attractive risk for insurers, organisations must demonstrate a mature and robust cyber risk management strategy. This includes implementing best practices, compliance frameworks, and ongoing monitoring to stay ahead of emerging threats. Having good governance, a well-defined cyber risk management plan, and adequate cyber insurance coverage are paramount. Organisations should establish policies, define roles and responsibilities, and ensure ongoing compliance with regulations. A comprehensive cyber risk management plan should be developed, regularly reviewed, and updated to adapt to changing threats . It is no longer the purview to say all security is managed by an IT Support Firm.

 


Cyber Risk Management Tips

 

To effectively address cyber risks, organisations must embrace a minimum level of security, including:

 

Multifactor Authentication

 

Implementing multifactor authentication (MFA) or two-factor authentication (2FA) adds an extra layer of security, preventing unauthorised access to sensitive information and systems.It requires users to provide an additional level of authorisation, such as a unique code sent to their mobile device, before accessing a system or application.

 

Cyber Security Framework

 

Adhering to a comprehensive cybersecurity framework, such as essential 8 principles provides organisations with a systematic approach to managing cybersecurity risks.These frameworks help identify and prioritise risks, establish policies and procedures, and implement controls to mitigate vulnerabilities.

 

Zero Trust Architecture

 

Embracing a Zero Trust Architecture is crucial in today’s cyber landscape. This cybersecurity model assumes that all users, devices, and networks are untrusted.It requires continuous verification of identity, authorisation, and authentication before granting access to any resources, reducing the risk of unauthorised access and lateral movement within the network.

 

Vendor Risk Management Programme

 

Third-party vendors can introduce potential vulnerabilities, making it essential to have a robust vendor risk management program. This program enables organisations to identify, assess, and manage risks associated with their vendors.It ensures that vendors comply with cybersecurity requirements and have adequate controls in place to protect sensitive data.

 

Effective Incident Response Plan

 

Having a well-defined incident response plan is crucial for minimising the impact of a cyber-attack. This plan outlines the steps an organisation should take in the event of a security incident, including detecting, containing, and mitigating the effects of the breach.An effective incident response plan can help reduce downtime, minimise data loss, and facilitate a quicker recovery.

 

Security Awareness Training for Staff

 

Employee negligence or malicious intent remains a significant cyber risk. Providing comprehensive security awareness training equips employees with the knowledge and skills to identify and report suspicious activities.Regular training ensures that employees understand their role in protecting sensitive data and helps create a culture of cybersecurity within the organisation.

 

Regular Penetration Testing Schedule

 

Penetration testing, also known as ethical hacking, simulates real-world cyber-attacks to identify vulnerabilities and weaknesses in an organisation’s systems.Regularly conducting penetration tests allows organisations to identify and address potential vulnerabilities before malicious actors exploit them.

 

Reliable Data Backup and Process Plan

 

Data backups are crucial for recovering from a ransomware attack or other data loss incidents.Organisations should establish a reliable data backup strategy that includes backup testing, regular backups, risk appraisal and offsite storage to ensure data integrity and facilitate recovery in the event of a cyber incident .

 


 

Take Action Today

 

In an increasingly digital landscape, cyber insurance is an essential tool in protecting businesses from the devastating consequences of cyber-attacks.

 

By embracing cyber cover must-haves and implementing robust cyber risk management strategies, organisations can strengthen their defenses and mitigate potential losses. Working with experts like KBI ensures access to tailored cyber insurance solutions and valuable guidance throughout the process. Don’t leave your business vulnerable to cyber threats—take action today to safeguard your digital future.

 

At KBI, our expert brokers understand the unique risks businesses face. We provide guidance, assist with the submission process, and offer a clear breakdown of available options when it comes to the insurance market.

In the event of a claim, our experienced team works alongside insurers and incident response teams to ensure a smooth process. The insurers we work with in the cyber market offer 24/7 emergency incident response at no extra cost, helping you mitigate the impact of a cyber event and get back to business.

 

Contact KBI today to discuss your insurance needs and secure a tailored program that safeguards your organisation.

 

Partner with KBI for your Business Insurance Requirements

Protect your organisation’s future by partnering with a specialised insurance broker, KBI. Whether you require a tailored insurance offering or prefer to choose from standard business insurance options, KBI works with you to find the right coverage for your needs. Don’t leave your business exposed—contact us today to explore your options.

 

Let KBI be your trusted partner in navigating risk and securing the right protection for your organisation’s long-term success.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

how to best protect your business against cyber security threats


Table of Contents

 

  • Remote Work Fueling Cyber Crime Threat
  • Key Cyber Risks Businesses Are Facing Now
  • Mitigating Your Cyber Risks & Cyber Related Business Interruptions
  • Cyber Business Interruption – The Costs
  • What Is Cyber Business Interruption Insurance?
  • What Does Cyber BI Insurance Cover?
  • How Is Cyber Business Interruption Loss Calculated?
  • What might a Cyber Business Interruption Claim look like?
  • Ensuring Your Policy Is Fit-For-Purpose
  • Final Takeaways

 

Remote Work Fuels Cybercrime

 

Cybercrime has been around since 1834 — when hackers breached the French Telegraph system and accessed stock market data. Since the 1830s, technology has developed exponentially, and so has cybercrime.

 

In a survey by McAfee, two-thirds of responding companies experienced a cyber incident in 2019. The average reported cost for each company’s most expensive breach was over $500,000.

 

Since 2019, the rise of remote work has only fuelled the fire. According to the Australian Cyber Security Center, cybercrime reports rose 13% in FY2020-21. Head of the Australian Cyber Security Center, Ms Abigail Bradshaw CSC, commented:

As we shifted online to go school work or work from home or buy things, or keep communicating, the criminals have also shifted and really prosecuted our online lives to make money or steal our information.

 

A recent Open VPN poll supports this statement. Among respondents, 73% of VP and C-Suite level IT managers believed that remote workers pose a greater cyber-security threat than on-site workers.

 

Companies need to accept that they are constantly exposed to the very real and increasing threat of cybercrime, and that cybercriminals are proactively and constantly trying to find ways to attack unprepared victims.

 

Key Cyber Risks Businesses Are Facing Now

 

If your business is reliant on computers to function, a cyber-related business interruption can have a massive impact on turnover. In extreme cases, malicious attacks can hinder your ability to generate income for weeks or even months.

 

In 2022, cybercriminals are more vicious and dexterous than ever before. And, as businesses trade static workstations for a more ‘fluid office’ the threat of cyber-attacks has increased exponentially. Today, even organisations with advanced security and firewall technology are at the mercy of cybercriminals.

 

Key cyber risks include:

 

1. Inadequate passwords:
It does not matter how secure your organisation’s secure infrastructure set-up is – humans are creatures of habit and their actions are easy to interpret. Weak passwords are an easy target for hackers. Passwords your staff should avoid include:

 

  • Passwords based on easily traceable personal data (birth dates, anniversaries etc.)
  • Passwords used on other platforms
  • Feeble passwords for example digit/letter combinations.

2. Phishing assaults
Phishing is an older attack method – but, according to a 2021 report by CISCO Umbrella, it still accounts for almost 90% of all data breaches. In a Phishing attack, the user receives communication (usually an email) that appears to be from a source they trust. The email requests personal data like passwords or security question answers, which the email’s real sender can use to access sensitive information.

 

Like password-related hacks, phishing attacks take advantage of human error. What makes phishing so effective is that through the social distribution of links and files, victims often inadvertently propagate malicious content.

 

3. Malware
Malware, or ‘malicious software’, is arguably the most widespread form of cyber security threat. Malware causes systems to behave strangely. This includes preventing access to programs, deleting files, syphoning information to other sources, and infecting connected systems.

 

4. Trojan viruses
Trojan Viruses are a form of malware. They disguise themselves as legitimate, helpful software. But under the surface, they are harmful. A common ploy is to send a warning to a user saying that it detected malware in their system. They offer to scan your device, but the ‘scan’ it carries out is actually the transfer of malware.

 

5. Crytopjacking
A definitive sign of the times – Cryptojacking is the act of hijacking a computerised device and syphoning computing power from the machine without the official user’s knowledge. The additional power is usually used to mine cryptocurrency.

6. Ransomware and extortion
Ransomware can be described as malware’s nastier cousin. Ransomware encrypts your files in a way that is nearly impossible to remove without the necessary software codes. Organisations can be held to exorbitant ransoms to free their systems and data. Although ransomware has been around for many years, 2021 saw increased ransomware complexity. New trends include:

  • Extortion
    When an organisation’s system is seized by threat actors, and money is extorted in exchange for the release of system functionality.

 

  • Double-Extortion
    When cybercriminals deprive companies of data in addition to encrypting it, allowing them to dictate greater ransom demands.

 

  • Ransomware-For-Hire
    There are syndicates-for-hire that will attack large enterprises for a big payout from a third party. These are well-organised crime rings with global networks, capable of attacking large enterprises.

 

  • Supply Chain Attacks
    2021 saw a stark surge in attacks on tech companies. Experts believe it’s due to the appeal of attacking software code, and then launching an attack on the company’s vendors and customers, creating a chain reaction of malicious attacks, often with the intent to collect multiple ransoms.

 

The risks associated with these threats are different for individuals and businesses.

 

Password breaches: The scale of a password breach is generally larger for a business than an individual. An organisation-wide breach can compromise the classified data, personal information or even bank accounts of thousands of clients.

 

Phishing: The impact of phishing depends on what information is accessed by the hacker. Individuals tend to be targeted for identity theft, while businesses tend to be targeted for bank account access.

 

Malware: Malware can result in the total loss of company data, or company client lists with costs running into the millions.

 

Ransomware: Ransomware attacks are by far the costliest. And unfortunately, they are becoming increasingly more frequent. According to Coverware, in the first quarter of 2021, there was a 43% increase in the demands from cybercriminals, averaging an extortion cost of $220k. This cost is exclusive of productivity loss, loss of system and network access, data loss, damage to brand reputation, client loss and loss of revenue. Extortion costs aside, the IT manpower and hours required to solve these onslaughts, is enormous. They can easily take weeks, if not months, to resolve and run into millions of dollars.

 

The below chart shows cybercrime statistics for the 20/21 financial year. It is a good indication of how prevalent cybercrime is in Australia at the moment.

 

how to best protect your business against cyber security threats 2

 


 

Cyber Business Interruption – The Costs

 

Most businesses are aware of potential expenses related to repairing operating systems, regaining system access and addressing data breaches following a cyber attack. But, many overlook a critical exposure: business interruption.

 

An attack related outage can cost your business thousands in lost profits and unexpected expenses. In a survey by McAfee, in 2019 the average length of a responding business’s longest cybercrime-related interruption was 18-hours. For more than 33% of respondents, attack-related system downtime cost between $100,000 and $500,000.

Cyber business interruption examples:

 

In 2017 the LA Times reported that a NotPetya worm attack interrupted business at Danish shipping company Maersk for two weeks at a cost of $200-$300 million.

 

According to Computer Weekly, a 2020 cyber-attack left Avon representatives in several countries unable to place orders. Parts of the Avon UK system remained down more than a week after the incident.

 

Mitigating Your Cyber Risk & Cyber related business interruptions

 

In addition to understanding the risks, and insuring against them, it’s probably most important to ensure companies are preparing for, and mitigating key risks. CT Group has provided a list of tactics all businesses should undertake to manage and reduce their exposure to the growing threat of cybercrime:

 

  • Staff training: Security Awareness and Cyber Training can greatly reduce the vulnerabilities companies face, by creating awareness and helping staff carefully navigate possible pitfalls.
  • Enforce cybersecurity policies: Organisations must implement strict policies and set a standard of behaviour when it comes to the safe use of cyber-based company assets. Cloud-based governance infrastructure can help to monitor and maintain sovereignty over the use and exchange of data.
  • Inspect encrypted traffic: Encrypted channels are now commonly used by cybercriminals. Adopt cloud-native, proxy-based applications that can inspect, decode, detect, and prevent threats in all HTTPS streams, for each user.
  • Up-to-date software: Apply software Patch Management, which ensures that all critical security updates are deployed to the endpoints within the network in a timely manner to address new vulnerabilities and fix them as they are discovered.
  • Migrate to the cloud: Move your company’s operations to the Cloud to gain stricter control over network access and avoid locally stored assets. The cloud also makes limiting and granting access very simple.
  • Develop a response plan: Prepare for the worst with the right business insurances. Speak to your IT service provider about a data backup and disaster recovery plan and build your response strategy into your overall business continuity program.
  • Understand the cover your business needs: Whilst it is imperative to establish what your company’s risk status is, having a clear understanding of the different types of insurances is just as important to make the right choices. For example, having a Cyber Insurance policy is essential to provide Emergency Incident Response, Liability and Financial Loss cover after an attack, while Cyber Business Interruption Insurance exists as a breach response to make up for the income that could not be earned during the restoration period after an attack.

 

What Is Cyber Business Interruption Insurance?

 

how to best protect your business against cyber security threats 3

 

Cyber insurance is a package of coverages that respond to losses associated with a cyber attack. The package can include cover for:

 

  • Cover for stolen funds & lost data
  • Costs to respond to and defend legal actions related to privacy or security breaches
  • Costs related to restoring and re-protecting your computer systems
  • Incident response costs and access to 24/7 emergency response teams
  • Costs associated with investigating and notifying a data breach

 

In some — but not all — cases, your cyber policy may include business interruption cover, which is arguably one of its most important coverage sections. Similar to traditional loss events like fire or flood, having insurance to restore operations following a cyber event is only useful if the business is able to survive through the restoration period.

The intention of cyber business interruption cover is to cover the revenue you would have earned if you had not experienced the cyber event. It can also cover additional expenses incurred to continue operating as best you can while the insurers help you recover from the loss.

 

If your Cyber policy does not include cyber BI cover, it is strongly recommended that you either add it to your existing policy or seek an alternative policy with more comprehensive coverages.

 

Unfortunately, organising Cyber BI cover is not simple. As a new and evolving form of insurance, cover terms can differ from insurer to insurer, and understanding what is best for your businesses can be confusing.

 


 

What Does Cyber BI Insurance Cover?

 

The insurance market has not yet settled into a standard way of covering cyber business interruption, which means policy terms can vary significantly between insurers.

 

Loss of income
Covers the difference between your net profit and the net profit you would have earned without business interruption.

 

Operating expenses
Covers ordinary operational expenses that you must continue to incur through the outage, such as rent and payroll.

 

Additional expenses
Covers expenses incurred for the express purpose of reducing an outage-related income loss. For example, hiring a tech expert to put a workaround in place or paying customer service staff overtime to process sales by phone.

Your policy may also include or have an option to add:

 

Forensic expenses
Covers costs associated with investigating the source of business interruption.

 

Contingent business interruption (also called dependent business interruption.)
Extends cover to situations where an attack on another company’s systems results in interruption to your business. The policy will usually require you to have a direct relationship with the company in question and would not extend to computer system failures among your customer base.

 

How Is Cyber Business Interruption Loss Calculated?

 

The way income loss is calculated will depend on your insurer and your policy. The process often includes consultation with forensic accountants and technology experts.

 

Some things worth noting are:

 

  • Cover will not include delayed sales
    Not all revenue lost during a system failure is lost forever. If a system failure means that a customer comes back later to purchase, this is not considered an income loss.

 

  • If there is no loss in revenue, you will not be able to claim for operational expenses.
    If your business generates a normal revenue during the outage, insurers expect you to cover your normal expenses. (If you incurred extra operational expenses to prevent revenue loss, you can usually claim these as additional expenses.)
  • The length of time for which your insurer measures interruption loss will depend on your policy.
    Your policy may have a waiting period, a retention period, or limit cover to the period between when the outage occurs, and your systems are restored.

 

  • Your policy may not cover at all if the interruption is too short
    Many policies will only consider a claim related to an outage over a set length. In our experience, the waiting period can be as small as 3 hours and as large as 72.

 

 

 

What Might a Cyber Business Interruption Claim Look Like?

 

It’s really difficult to say what a Cyber BI claim will look like. Terms vary significantly from insurer to insurer. And, since the settlement is often put together at the discretion of a forensic accountant. Some fictitious and slightly simplified examples of claims are below. These can help you to understand some different aspects of cover – but should not be considered representative of an actual claim.

Example 1.

 

Situation:
Your website is hit with a distributed denial of service (DDoS) attack. The service DDoS attack takes your site offline for 24 hours. The next day your lines are so busy that many of your customers get sick of waiting and go elsewhere.

 

Your Policy:
You have Cyber BI cover with a 12 hour waiting period. You are not covered during the waiting period or for the first $5000 loss after. Cover extends until systems are restored.

 

Result:
The amount you are able to claim in this case is very limited. Your policy’s aggressive retention terms and short indemnity period, mean that you can only claim for 12 hours out of your 24 hour outage. And, you can not claim for residual losses over the next few days.

Example 2:

 

Situation:
Your employee opens a personal email on their work computer. Her private email account does not have the same security protections as the work email account. Her computer is infected by a ransomware virus that spreads across your network. The virus encrypts all files, and thieves demand a ransom for the encryption key. It takes two weeks to break the encryption and fully restore your systems. As a result of the outage, a major supplier triggers the cancellation clause in an exclusive supply contract.

 

Your Policy:
You have business interruption cover with a 12-hour wait period. There is no retention period or dollar retention. Cover applies under the policy for 30 days after systems are restored.

 

Result:
You will be able to claim for losses during the entirety of the outage. You will also be able to claim residual losses for the next 30 days. However, if it takes more than 30 days to replace the contract you lost, there will be some out of pocket loss.

 

Ensuring Your Policy Is Fit-For-Purpose

 

Especially for complex policies like cyber business interruption, it would be extremely beneficial to work with a specialist broker who can properly review your requirements and align the best solutions to them.A specialist insurance broker will also:

 

  • Make sure you know all the options available on the market
  • Explain the differences between cover types — including how they might affect a claim
  • Provide targeted advice based on your business requirements
  • Speak to insurers on your behalf to ensure optimal policy terms
  • Support you in the event of a claim

 

Final Takeaways

 

  •  The rise of remote work is making businesses more vulnerable to cyber-attacks.
  • A broker can give you a clear picture of the cover available, explain each cover option to you, and help you make sure that the policy you end up with is the best one for your needs.
  • Businesses should be aware of the key risks they are facing.
  • Businesses should mitigate risk wherever possible.
  • Cyber insurance, including Cyber BI cover, is crucial for businesses in 2022.
  • Choosing a cyber policy is difficult because policies vary significantly from insurer to insurer.
  • To get your Cyber BI cover right, KBI recommends engaging a specialist broker.
Should you need more information on Cyber Insurance, please contact the KBI team on 1300 907 344 or visit our cyber insurance page

 

Should you need more information on Cyber Security, please contact the CT Group team on 1300 434 237 or email solutions@ctgroup.com.au

 


Disclaimers

 

All information on the document is provided in good faith, and while significant care has been taken to ensure the information is conveyed in the intended manner, we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability or completeness of any information on the document.Under no circumstance shall we have any liability to you for any loss or damage of any kind incurred as a result of the use of the document or reliance on any information provided on the document. your use of the site and your reliance on any information on the site is solely at your own risk.

 

External Links Disclaimer

 

The Site may contain (or you may be sent through the Site) links to other websites or content belonging to or originating from third parties or links to websites and features in banners or other advertising. Such external links are not investigated, monitored, or checked for accuracy, adequacy, validity, reliability, availability or completeness by us.WE DO NOT WARRANT, ENDORSE, GUARANTEE, OR ASSUME RESPONSIBILITY FOR THE ACCURACY OR RELIABILITY OF ANY INFORMATION OFFERED BY THIRD­PARTY WEBSITES LINKED THROUGH THE SITE OR ANY WEBSITE OR FEATURE LINKED IN ANY BANNER OR OTHER ADVERTISING. WE WILL NOT BE A PARTY TO OR IN ANY WAY BE RESPONSIBLE FOR MONITORING ANY TRANSACTION BETWEEN YOU AND THIRD­PARTY PROVIDERS OF PRODUCTS OR SERVICES.

 

FAQs

 

  • Is cover limited to cyber events? What about general IT outages?

 

➤ In most cases, cover is limited to a privacy or security breach. But, there are some situations where extended coverage is available for other outages.

 

  • What period will my Cyber BI policy cover lost profit and additional expenses for?

 

➤ Your insurer will only be responsible for covering lost profit and additional expenses for the period agreed on in your policy. This period differs significantly from insurer to insurer, and the option you pick can drastically affect your position in the event of a claim.

 

Some typical timeframe based limitations include:

 

  • A waiting period before a claim is eligible: Your policy may exclude cover for interruptions that do not last longer than a specified number of hours (or sometimes days.)
  • A waiting period before losses are eligible: Your policy may exclude all cover for losses that take place in the waiting period and only calculate loss from the time the waiting period ends.
  • Cover ends when systems are restored: Your policy may consider a business interruption to be over as soon as systems are restored. If your policy limits cover this way, it will prevent you from claiming for residual effects of an outage—for example, the revenue lost in the days following an outage due to disgruntled customers.
  • Cover ends a set number of days after your system is restored: Some policies cover losses for a period of time after systems are restored. This allows you to claim for the residual effects of a business interruption. Still, there is no guarantee that cover will last long enough to support you until you return to normal income levels.
  • Cover until income is restored: Some policies include cover for the entire period of income loss. This is the most comprehensive option available but usually also the most expensive.
  • Do businesses have to cover a portion of their own losses?

 

➤ Many policies expect the insured to cover a portion of losses. This can be called the retention, excess, deductible, or waiting period, and it might be defined as losses within a period of time, a dollar amount, or both. Like most things in Cyber BI insurance, retention details vary significantly from policy to policy.

 

Common Cyber BI retention terms include:

 

  • No cover for losses and expenses incurred during the waiting period
  • No cover for the first $X of losses and expenses
  • No cover for the first X hours of interruption
  • No cover for losses and expenses incurred in the waiting period and for the first $X of losses and costs incurred following

 

  • What retention period and cover timeframe is right for me?

 

There is no one-size-fits-all rule. The type of cover that is right for you will depend on many factors, including your operations, your operating costs, your cash flow, the complexity of your systems, and your core vulnerabilities. In our opinion, the best option is always to consult an expert broker.

 

Even among companies in the same industry, needs can vary:

 

Take a 24-hour outage for an online store. Some stores are confident that customers will come back the next day, while others are not. Some stores will lose a single order per customer, while others will lose months of subscription or follow-up purchase income.

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

a growing ransomware threat is driving change in the australian cyber insurance market


Overview: The Australian Ransomware Action Plan

 

The Australian Ransomware Action Plan builds on existing cybercrime prevention measures, including education campaigns and support services. The Minister of Home Affairs, The Hon Karen Andrews MP, says:

 

The Morrison Government is taking action to disrupt, pursue and prosecute cybercriminals. Our tough new laws will target this online criminality, and hit cybercrooks where it hurts most – their bank balances.

The newly proposed measures include:

 

  • Mandatory ransomware incident reporting for businesses with an annual turnover greater than $10m.
  • A standalone offence for cyber extortion with an increased maximum penalty.
  • A second standalone offence with a higher maximum penalty for cybercriminals who target critical infrastructure.
  • Making it illegal to knowingly deal with stolen data as part of committing a separate criminal offence.
  • Making it illegal to buy or sell malware for use in cybercrimes.
  • Giving law enforcement agencies better ability to track and seize cybercriminals’ cryptocurrency transactions.

 

 

Overview: Underwritten or Oversold — The CSCRC’s Policy Paper on Cyber Insurance

 

The CSCRC is a government-funded organisation that undertakes cybersecurity research in collaboration with relevant industry members, academics and the government. CSCRC CEO Rachael Falk co-authored their paper on cyber insurance. She says:

 

This policy paper explores a number of issues related to cyber insurance, with a focus on how it can hinder and help cyber security uplift across the Australian economy,

The paper’s key findings are:

  • Australia should ban insurance companies from including ransomware extortion payment cover in their cyber insurance policies.
  • Insurers should provide greater transparency around what cyber insurance policies cover and exclude.
  • Insurers should require businesses to meet minimum cyber protection standards before a policy is issued.
  • Insurers should work with telecommunications companies, cloud service providers and software providers to increase insurance uptake by bundling products together.

 

 

Why has the CSCRC suggested a ban on ransomware payment cover?

 

The CSCRC argues that insurers are “unintentionally feeding the ransomware epidemic” by providing ransomware payment cover.  Falk says:

 

We believe the payment of ransoms by insurers is helping drive the illicit ransomware trade – what is vital when it comes to ransomware and cyber insurance is that we start to starve out the cyber criminals and break the payment chain by stopping insurers paying the ransom.
The report also argues ransomware payment cover may lead organisations to be lax about cyber security.

 


 

Is banning ransomware cover the answer?

 

Since the CSCRC released their paper, questions have been raised around the efficacy and fairness of banning ransomware payment cover. Objections to banning ransomware payment cover can include:

 

Tailoring Insurance Programs to

Association Needs

 

i. Insurance is not always a deciding factor in ransom payment decisions

 

2021 IDC survey suggested that 43% of Australian businesses would “probably pay” a “widespread ransomware attack” that “significantly hampers” operations, even if insurance was not in place

 

ii. There are other effective ways that insurers can encourage businesses to take cyber protection seriously.

Several other ideas mentioned in the CSCRC’s report encourage businesses to step up their cyber policies without removing insurance protection. Examples include requiring businesses to meet a minimum cyber security standard before having insurance, offering insurance premium incentives for solid security practices and providing free risk assessment tools.

iii. Banning ransomware payment cover will take the option of paying a ransom off the table for some businesses.

The Ransomware Action Plan makes it clear that the Australian government does not condone ransomware payment. But it does not go as far as making payment illegal.

 

For many businesses paying a ransom demand is the only realistic option available. This includes organisations who fail to recover their systems in other ways, who are at risk of bankruptcy unless they take immediate action, and who experience attacks on systems critical to the immediate personal safety of their staff or customers.

 

 

Is a ban on ransomware payment cover likely?

 

“It’s hard to say,” explains KBI’s lead cyber insurance broker Tyler Speers. He notes that Australia is not the only country looking into this sort of ban. He says:

 

As the cost and frequency of ransomware attacks grows, the risks associated with providing ransomware cover have begun to push the risk appetite of many insurers. As brokers, we are beginning to see restrictions on ransomware payment cover in Australia. Internationally some insurers, like AXA France, have voluntarily ceased ransomware payment cover, but it is unclear how other insurers will respond to these changes.

 

For insurers who have enacted (or are considering enacting) limitations on ransomware cover, a market-wide ban would help ensure their policies will not lose competitiveness. However, not all insurers will necessarily share this view.

For concerned businesses, Speers adds that the best thing to do is strengthen your cyber security policies.

 

We don’t know how the cyber insurance market will change over the next 12 months. But there are three things we do know. Firstly, changes are likely. Secondly, changes will almost certainly favour businesses with robust cyber protections and ransomware attack plans in place. And thirdly, in any circumstance, the best way to prevent issues with ransomware payment is to prevent attackers from gaining access to your systems in the first place.

 

How do I protect my business from a ransomware attack?

 

The CSCRC suggests that a best practice Cyber Security Checklist for SMEs include:

  • Clear policies around system access, downloads, emails and 3rd party devices (like USBs.)
  • Regular staff cyber security training
  • Regular onsite and offsite data backup
  • Regular data backups
  • Up-to-date antivirus software
  • A patching program
  • A strong password policy
  • Multi-factor authentication
  • Strong access management

 

KBI suggest that you also have

  • An existing connection with a team of experts, including experts on cyber security, cyber law & cyber insurance.
  • A solid incident response plan

 

What should my incident response plan include?

 

A good ransomware incident response plan helps you respond quickly to cyber attacks by providing clear and detailed instructions for dealing with an attack.

 

We suggest that your plan incorporate:

 

  • A team of experts
    As well as relevant internal parties, you should create your plan in consultation with a legal expert, a risk manager, a cyber insurance broker, a cybersecurity expert and a cyber security forensic service provider.

 

  • A policy around the payment of ransom demands
    If an attacker takes over your operating system, will your business pay ransom demands? If so, in what circumstances? Considerations might include whether you can restore data, what data the attackers have accessed and whether the ransom cost exceeds the recovery cost.

 

  • An immediate response plan
    Who is on your response team? Who will you need to contact? If you will consider paying the ransom, how will you get the information you need to decide? Who will decide? Who will need to sign the decision off?

 

  • A ransom payment plan
    If you decide to pay the ransom, who will negotiate it and organise the payment? Who will ensure the payment is legally compliant? What information will they need to do this? How long will it take? What will you do after the ransom is paid?
  • A ransom non-payment plan
    Will you attempt to restore your operating systems, encrypted data and encrypted files from backup or break the encryption? If both, which one is the priority? Who will you contact? What will they need to do? How long will it take?

 

  • Full sign off from your board

 

  • Don’t forget to check (and document)

 

  • The possible legal implications of your plan.
    Your legal expert can help with this.

 

  • The way your plan interacts with your cyber insurance.
    Does it take the best advantage of your available cover? Does it trigger any exclusions?

 

  • Whether parties involved in your plan have the necessary permissions.
    Has your insurer approved the third parties who be helping guide your response? Is the person who will contact your lawyer authorised to do so? Is the person who will pay the ransom authorised to do so?

 

Key takeaways

 

  • The Australian Government is taking action against ransomware attacks.
  • The CSCRC has suggested that their plan include major changes to cyber security insurance.
  • The CSCRC recommendation for a ban on ransomware payment cover has met with objections but may still be implemented.
  • In any case, we advise businesses to step up their cyber security practices, talk to their broker about insurance cover & make a solid plan for ransomware attacks.

 

To talk to a broker, or find out more about cyber insurance, visit our cyber insurance page.

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

fy21 q3 q4 cyber insurance snapshot


At a glance: The OAIC January–June 2021 Notifiable Data Breaches Report

 

fy21 q3 q4 cyber insurance snapshot 2

 

Top 5 Industry Sectors to notify data breaches

fy21 q3 q4 cyber insurance snapshot 3

 

Sources of data breaches

fy21 q3 q4 cyber insurance snapshot 4

 

Cyber Incident Breakdown

fy21 q3 q4 cyber insurance snapshot 5

 

  • Q3/Q4 had 446 reported breaches — down 16% from Q1/Q2.
  • Malicious or criminal attacks caused 65% of reported breaches. Of these, 66% were cyber incidents.
  • Human error was the second-highest cause of data breaches. It accounted for 30% of breaches reported.
  • Health service providers reported the highest number of breaches (19%), followed by the finance & superannuation industry (13%.)
  • The overall reduction in breaches included a 34% drop in human-error breaches and a 5% drop in breaches caused by a malicious or criminal attack.
  • However, two types of malicious or criminal attack related breaches are on the rise. Ransomware incidents increased by 24%, from 37 to 46. Breaches caused by social engineering or impersonation fraud increased slightly, from 34 to 35.
  • Following the report, the OAIC issued a press release highlighting ransomware attacks and impersonation fraud as causes for concern.

 

The OAIC urges Australian businesses to maintain adequate privacy procedures

 

Throughout the report and subsequent press release, the OAIC reinforced the expectation that businesses:

 

  • Protect themselves adequately from privacy threats.
  • Have systems in place to quickly identify breaches.
  • Have appropriate incident response plans.

This expectation extends to the threat of ransomware attacks and impersonation fraud. The Australian Information Commissioner and Privacy Commissioner Angelene Falk says:

 

We expect entities to have appropriate internal practices, procedures and systems in place to assess and respond to data breaches involving ransomware.

Entities should continually review and enhance their security posture to minimise the growing risk of impersonation fraud.

OAIC recommendations for preventing and responding to ransomware and identity fraud risks included:

 

  • Multi-factor authentication.
  • Automatic account holder notification for failed logins and personal information updates.
  • Appropriate audit and access logs.
  • An appropriate incident response plan.
  • Possible early-stage forensic analysis from a cyber security expert following a ransomware attack.

 


KBI recommends businesses seek cyber insurance

 

When commenting on the report, Commissioner Faulk acknowledged the rise of the dark web and the increasing ease with which cybercriminals can bypass entities’ impersonation fraud protection measures.

 

This is part of the reason that KBI’s lead cyber insurance broker Tyler Speers recommends pairing robust privacy protection measures with an equally robust cyber insurance policy:

Strong cyber security policies and procedures can reduce your business’ risk of a cyber attack. But, they cannot remove that risk altogether. Cyber attacks can and do have significant financial repercussions for the businesses targeted. If your business is targeted, a cyber insurance policy can help cover costs associated with privacy lawsuits, regulatory defence, extortion demands, notification, and data recovery. It will also give you access to an emergency incident response team to put the situation in the hands of the experts.

 

Given the growing risk of ransomware and impersonation fraud, Speers recommends that all businesses who hold personal data seek cyber insurance. He also suggests that businesses with an existing policy have a proactive conversation about risks and cover requirements with their broker.

 

 

KBI predicts changes to the cyber insurance market in FY22

 

Increases in the number of ransomware and impersonation attacks could result in tighter underwriting criteria for cyber insurance policies in FY22, as well as harsher terms for cover. “We are already beginning to see policies that limit cover for ransomware payments,” says Speers.Government legislation in response to the growing threat of ransomware attacks is also a possibility. In June, Tim Watts, a federal Labour MP, introduced the private member’s Ransomware Payments Bill 2021. If passed, this bill would require businesses to report ransomware demands to the Australian Cyber Security Center.

 

Key takeaways

 

  • Ransomware and impersonation fraud is a growing threat
  • Businesses should look to improve privacy protection measures and have a plan in place for cyber attacks.
  • Businesses should speak to their broker about the financial risks associated with a cyber attack and the possibility of transferring those risks to insurance.
To talk to a broker, or find out more about cyber insurance, visit our cyber insurance page.

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

8 essential policies procedures for improved cyber security


Table of Contents

 

1. Callback Procedures

2. Multi-Factor Authentication for Devices and Applications

3. Automatic Updates and Patching

4. Daily Backups

5. Two Factor Payment Authorisation

6. Device Security

7. Lost or Stolen Personal Device Procedure

8. Social Media Security Policies

 

8 essential policies procedures for improved cyber security 2

1. Callback Procedures

 

This is by far one of the best things you can do to prevent cybercrime.

 

We’ve all seen them – an email asking you to pay an invoice or change bank details from an apparent client or trusted individual. These schemes (phishing) are getting much better all the time, so it’s important to put procedures in place to mitigate against these losses, even when it’s near impossible to identify the fraudulent emails from the legitimate ones.

 

A call-back procedure is when you verify requests to pay an invoice for the first time or alter bank details by calling a trusted person at that company.

 

Step 1
You have received an email/call to pay a new invoice or set-up/update payment information. This includes setting up a new supplier/vendor/other or making any changes to their payment details.

 

Step 2
Verify the request before taking any action by calling a trusted representative of the company directly to confirm that the request or the payment information is accurate and came from them.

Step 3
DO NOT do this by responding to the request email itself or contacting a number included in the request email. The request email may be coming from fraudsters pretending to be from the familiar company/person or that company/person’s email address may be compromised.Step 4
It is recommended that you have a register of representatives for suppliers/vendors/others for you to contact and verify any of these changes.Many cyber insurance policies now require you to have call-back procedures in place before you can purchase the Social Engineering section of the policy, so this really is a must-have.

 

2. Multi-Factor Authentication for Devices and Applications

 

This is another must-have and was referenced by the Australian government as one of the best things you can do to protect your company (and person) from a cyber security breach.

 

It is simple to get started and most systems have this functionality already – you’re probably already doing it for a lot of them. The standard way of doing this is by making it so you need both a password and SMS code to login to an account or system.

 

  • Combination of passwords and other authentication methods for devices and applications (i.e. SMS codes, keycard, facial/fingerprint recognition).
This can be facilitated through each application with the help of your IT provider. See this article from the Australian Government for tips on implementing multi-factor authentication procedures:

 

Australian Government – Implementing Multi-Factor Authentication

 

3. Automatic Updates and Patching

 

If you set up your applications/accounts right, this is a “set & forget” way of keeping your security controls up to date.

 

Software updates are more than the glamorous changes to the operating system on your phone – software companies (Microsoft, Apple) use “automatic updates” as bug fixes and security patching to ensure security is up to date and any errors or holes are fixed as soon as possible. By turning on this feature, your devices and applications will automatically update to keep your device/network secure.

This article from the Australian Government outlines the importance of automatic updates and how to turn them on:

 

Australian Government – Step by Step Guide: Turning on Automatic Updates

 

4. Daily Backups

 

This is something that most leading systems will already feature automatically (i.e. outlook, salesforce), but it is recommended that you liaise with your IT team and application service providers to ensure all company data is backed up at least once a day.If a cyberattack occurs, your data should be able to be recovered easily. Most businesses have back-up procedures in place already, but it is common that these are less frequent, such as weekly back-ups or even monthly. A lot can change during a week or month – the tools are available and not normally cost prohibitive, so why not make sure everything is up to date should the worst occur?

 

5. Two Factor Payment Authorisation

 

This is a common risk prevention procedure used to stop fraud/crime but is also relevant for cybercrime. It is another procedure that most insurers require to provide the relevant cover (i.e. crime section of a policy).Payments made to vendors, either across the board or at a certain dollar amount, should be processed and/or authorised by at least two company representatives (i.e. accounts team & director). This not only prevents one individual from going “rogue”, but also acts as an extra check stop to prevent an accident or miscommunication – often the reason a social engineering loss occurs.

 

6. Device Security

 

Device security is one of the more common cyber risk management procedures and most of us will already have these on our personal items, but it is just as important to make sure these are implemented on your business devices.

 

  • Monitor privacy settings for frequently used applications (i.e. social media)
  • Automatic screen lock so a device is not accidentally left open and easily accessible.
  • Unique passwords that are updated regularly.
  • Antivirus software that is kept up to date (don’t ignore those update reminders!)
  • Avoid free wireless networks for business devices or applications. This includes using your personal device for work applications (i.e. email while travelling) because free wireless networks are an easy way for cybercriminals to hack into your systems.

 

7. Lost or Stolen Personal Device Procedure

 

Most of us have lost an electronic device in some capacity, whether it was personal or business related. If it’s a business device, what should you do to protect important company information?

 

  • Wiping data from a stolen device. Most devices have this function already – if a device is stolen, it is reported and then all data is wiped from the device. This may seem like drastic measures, but if you have backed everything up then you won’t actually lose much – but it prevents someone else from accessing your data.
  • Ensure the device is backed up so the data is not lost with the device.
  • Ensure any ‘find my device’ function or the ability to encrypt the device are activated, as these measures can provide additional security in the event of it being lost or stolen. It can also help get the actual device back

 

8. Social Media Security Policies

 

If your business uses social media (LinkedIn, Facebook, Instagram) you should have some kind of policy in place as a security control. A standard social media policy should include:

 

  • Limited number of authorised users have access to company social media accounts;
  • System in place to immediately revoke user access if they are no longer at your company;
  • Outline what can and cannot be posted on company social media accounts;
  • Outline the process for responding to complaints or inappropriate comments;
  • Process for regaining control of hijacked company social media accounts, which can be facilitated with the help of your IT provider;

 

This article from the Australian Government provides some useful tips for social media security policies:

 

Australian Government – Security Tips for Social Media

 


 

What are some other ways to prevent cyberattacks?

 

Policies and procedures are only part of the solution. Training staff, leveraging technology and other preventative measures are significant in protecting your company from cyberattacks.See our recent article for 10 ways to prevent a cyberattack.

 

What happens if a cyberattack occurs anyway?

 

You can take every possible step in preventing a Cyber Attack and one may still occur. Therefore, it’s important to manage this risk by putting a Cyber Insurance policy in place.See our recent article explaining what to do following a cyberattack, including tips on creating a 7-step plan:

Looking into a cyber insurance policy?

 

Here’s an article we’ve written about what a cyber insurance policy does and why you need it:

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

5 tips to improve your cyber security while working from home


 

As long as you have a stable internet connection, you can still log into the company systems and work from the comfort of your own home. This has a number of benefits, including cutting down commuting hours, providing flexibility for employees, and allowing a business to continue operating if the office space is suddenly unusable. This sense of remote working has never been more prevalent, as thousands are being asked to do so in the midst of the COVID-19 spread this month.

 

However, it is important to remember that your home computer likely does not have the same level of cyber security in place as your work equivalent. Savvy businesses will always have some form of cyber security measures in place to protect important files and to keep criminals out.

This may come in the form of antivirus software, firewalls, two-factor authentication, and more. Whereas, unless you have actively downloaded similar measures onto your home system, you may find yourself far more vulnerable when working remotely. These vulnerabilities are often magnified even further when working on the road, as you open yourself up to unsecured and shared Wi-Fi networks.

 

Over half of all employees across the globe are now working outside their main office for at least 2.5 days per week. Over 80% of employees asked said they would always choose a job with remote working opportunities over one that had none. 85% claim that productivity has increased due to the flexibility provided by remote working. However, despite all this, almost half of businesses are concerned about data security in relation to remote working.

 


Table of Contents

 

1. Treat your home computer as you would your system at work
2. Updates and patches will keep your computer protected
3. Always be aware of unsecured Wi-Fi networks while away from the office
4. Create a working from home security policy for your business
5. Give yourself the best chance with the latest physical security

 

1. Treat your home computer as you would your system at work

 

We can have a tendency to let our guards down, not only when we are in the home environment, but also when we are browsing on our home computers. These systems belong to us, so we do not have the natural feelings of guilt or responsibility that we have when operating expensive machines at work.

 

However, it would be a mistake to treat your home computer any differently from the one you use within the office setting.

The number one cause for infection on a company system is human error, which only highlights the growing need for improved cyber security practices and education. Chances are when using your work computer, you are careful about the messages, attachments, and links that you open.

 

You probably do not risk entering unknown third-party sites, especially when warned against doing so by your antivirus system. You should be taking these same exact steps when working from home. Remember, it isn’t just your personal system you are putting at risk, but the company servers too.

 

2. Updates and patches will keep your computer protected

 

Constant reminders about updating software can be irritating, but it is an absolute necessity in the modern internet age. Software updates and patches are released regularly to ensure that the system not only runs as smoothly as possible, but also that any exploits, vulnerabilities, or possible avenues of attack for cyber criminals are blocked off.In short, failing to update your system leaves it far more vulnerable to a cyber attack. The easiest thing to do is set your home computer to install updates automatically, that way they will likely download when you are asleep or not using the system in question.

 

3. Always be aware of unsecured Wi-Fi networks while away from the office

 

While the Wi-Fi network within your office building is likely to be secure and encrypted, the same cannot be said for every router you connect to on your travels. If you risk using an unsecured network while working remotely, you risk allowing nearby malicious attackers a route into the company network and systems.

 

If they successfully find a route in via your connection, they may be able to access all kinds of sensitive information, causing as much damage as they like in the process.

To help protect your network while away from the office, you can invest in a secure home Wi-Fi network which would likely replicate the environment you have at work. You can also use a “Virtual Private Network” (VPN) connection when working on the go, which is a program used to hide your network data while online.

 

4. Create a working from home security policy for your business

 

Many businesses have work-from-home security policies in place to help prepare themselves and their employees for mitigate cyber security issues while working remotely.

 

Here is our 10-point guide for simple steps to set up your own policy:

1. Create strong passwords for all accounts, computers and mobile devices

2. Don’t use the same password for work and personal accounts

3. Set up Two-Factor Authentication (i.e. password and phone number)

4. Use antivirus software

5. Install patches and updates (i.e. automatic updates)

6. Partake in training on identifying phishing email scams

7. Regularly back up your data

8. Make sure that all communication is encrypted

9. Make sure that your Wi-Fi router is secure

10. Use a Virtual Private Network (VPN) connection

 

5. Give yourself the best chance with the latest physical security

 

In simple terms, the more modern the technology, the better the physical security included will likely be. Outdated computers can carry outdated software, much of which will not be affected by the latest patches and updates.Ensure that your system is up to date and capable of fighting the cyber threats of today!

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

what do cyber claims look like


 

Cyber Events are unique in that they are usually random – they tend to target any company, regardless of size or industry.Cyber Insurance losses/coverages are split into two categories: First-Party and Third-Party:

 

what do cyber claims look like 2

Cyber Insurance Claims Examples

 

Social Engineering – Vendor Email Hacked

 

The controller for a distributor of component parts was responsible for making regular payments to overseas vendors from which the distributor purchased products for resale in the United States. After many months of working with one particular vendor and receiving regular shipments, the controller received an email that appeared to come from his vendor contact, indicating that the vendor’s bank was having issues with accepting payments, and asking if the next payment could be made to a new bank. Due to the vendor’s overseas location, verification was a challenge. After the supposed vendor applied some pressure, the controller paid the invoice via wire transfer.The following month, when the real vendor realised that its best customer’s payment was overdue, an investigation determined that the vendor’s email had been hacked, and an imposter had been socially engineering the company into believing that the change in bank information was authentic. In the end, the fraudster stole almost $250,000 from the distributor through this cyber attack.

 

** This claims example has been provided by Chubb Insurance Company of Australia Limited **

 

Privacy Breach, Fines & Investigation (First Party & Third-Party Claim)

 

An IT company misplaced multiple drives that contained personal information for over one million customers. It was unknown whether the drives were lost, stolen or destroyed. The IT company was required to notify the affected individuals, as well as the privacy regulator. The regulator investigated the incident and fined the company for failing to have appropriate safeguards in place to protect customer information.The company incurred legal fees of $1,000,000 in connection with the regulatory investigation and defending legal actions brought by affected customers and for the costs and expenses in notifying customers their personal information had been lost, stolen or destroyed. The company was also fined $75,000 by the privacy regulator. The total loss to the company exceeded $5,000,000.

 

This type of scenario triggers multiple Insuring Clauses under a typical Cyber Liability Insurance policy, including privacy fines and investigations.

 

Data Breach

 

Users of the Insured’s online network had reported that they had received spam emails from an individual they knew to be an ex-employee of the Insured, to a unique email address that they had created exclusively for use on the Insured’s website. Investigations confirmed that while working for the Insured, the ex-employee had access to the relevant customer databases and forensic IT investigations confirmed the data breach.Steps were taken to ensure that the ex-employee deleted the data and signed an enforceable undertaking not to use the data in future. The quick action to contain the breach and engage with the regulator meant that the regulatory investigation could be responded to in a way that satisfied the regulator and the costs and risk could be contained.

 

Ransomware

 

A professional services company was affected by cryptolocker virus identified as the Lockey virus. A network of 20 computers were affected with users unable to access files, which had been encrypted. Investigations revealed the virus entered the computer network via an infected email attachment which had been inadvertently opened by an employee.An IT specialist was approached to re-build and restore lost data from the back-up server. The IT costs involved in containing and recovering from the incident were claimed under the Cyber Insurance policy. No ransom was paid as a result of the data recovery efforts.

 

Employee Error (First Party & Third-Party Claim)

 

A retailer emailed a group of customers to promote a sale with special discounts available to them. The retailer intended to attach a copy of the flyer detailing the discounts but instead attached a copy of a spreadsheet that contained a customer list, including customer names, addresses and credit card information. The retailer was required to notify all affected customers of the error and offered credit monitoring services.

 

Several of the affected individuals began legal proceedings against the retailer. The notification costs and credit monitoring costs totalled $50,000, and the amount to settle the legal proceedings with the retailer’s customers combined with the associated legal costs and expenses totalled $100,000.

Most Cyber Risk Insurance policies provide coverage for breach of privacy which includes legal costs, indemnification of third parties and crisis management costs.

 

** This claims example has been provided by Chubb Insurance Company of Australia Limited **

 

DDOS – Distributed Denial of Service

 

An online service provided was hit by a Distributed Denial of Service (DDoS) attack – a type of cyber incident that can be covered by insurance. The DDoS attacks effectively starved the web site host system of resources by flooding it with malicious traffic and preventing legitimate customers logging on or accessing the website. Account Customers utilising the Internet, Mobile Phones and Mobile Apps were unable to log on, new users were unable to set up accounts.A specialist forensic IT vendor was appointed to investigate and mitigate the attack. The incident involved serious disruption to the insured’s business and loss of income as a result of its website being down for approximately one week at one of the busiest times of the year. The Cyber Security Insurance policy responded to the costs of the IT investigation and remediation and the loss of profits suffered.

 

** These claims examples have been provided by AIG Australia Limited, Chubb Insurance Company of Australia Limited, and Insurance Australia Group Limited **

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

what to watch out for in a cyber insurance policy 1


1. Disclosure of Information Before & During the Policy Period

 

Someone applying for insurance must disclose any matter they know to be relevant to the insurer’s decision to accept the risk.Continuous disclosure is also very important: if there is any material change to the company during the policy period, the insured needs to keep the broker/insurer informed of the change.

 

2. Cancelling a Policy

 

Cyber Insurance policies are written on a claims made policy form, which means the loss/claim must be reported and indemnity granted during the period of insurance to trigger a claim. If a policy is cancelled and a claim is reported afterwards, the claim will likely be denied – even though you may have had a policy in place at the time the loss actually occurred.An example of this situation is if your system is breached while you have a policy in place, but you aren’t made aware of any loss/attack until later. If you had a policy in place when the breach occurred, but cancelled it before you were made aware of the loss, the claim would likely be denied. This can be more likely than one would think, as cyber criminals can breach a system (take control, install malware/ransomware, etc.) months before they decide to take any sort of action that notifies you of the attack.

 

3. Social Engineering Coverage

 

This is an important coverage, as Social Engineering losses are more frequent than ever, but this section is typically automatically excluded from a policy unless it is specifically added and noted on the schedule for an additional premium.

 

This coverage is also often misunderstood and lumped under the term “Cyber Crime” – this is incorrect. Cyber Crime is a very broad term that can include sections that are almost always automatically covered, such as Cyber Extortion. Social Engineering has recently been defined more adequately as Funds Transfer Fraud, which is the fraudulent transfer or theft of funds caused by instructions made by a person purporting to be an authorized employee, outsourced provider or customer of yours. This also covers off the definition of “phishing”, which would be included in this section.

This coverage is typically optional for an additional premium and is sub-limited. To see if your policy includes this coverage, it should be detailed on the policy/quotation schedule and further explained in the policy wording.

 

4. Retroactive Date & Known Claims

 

The retroactive date determines if a policy will provide cover for past acts that have only been discovered after the fact – in the policy period. If this date is either “unlimited” or states a specific date, there is cover for claims that had occurred in the past and reported during the policy period, as long as they were not previously known by the insured.If this date is “inception”, then cover is only provided for acts occurring after the policy is put in place while it is in force.

 

5. Exclusions

 

Cyber Specific Exclusions

 

  • Electromagnetic Discharge
    The existence, emission or discharge of any electromagnetic field, radiation or magnetism that allegedly or actually affects the health, safety or condition of any person or environment, or that affects the value, marketability, condition or use of any property.

 

  • Power Failure or Core Internet Infrastructure Failure
    Excludes claims caused by power outage, or any other failure to a system, infrastructure, or network where you have no direct control.

 

  • Product IP & Patent Infringement
    Excludes acts that cause the infringement or misuse (among other things) to any patent or patent right.

 

  • Unsolicited Communications and Data Collection
    This excludes claims for unsolicited emails, phone calls, or other correspondence which breaches the applicable legislation. This can sometimes be written back into the policy through the Privacy and Cyber Security coverage section if it occurred due to a network compromise.

 

** The above are general examples only; each insurance policy is different and standard exclusions may apply. Please read your PDS and contact your insurance advisor to review your specific policy. **

Standard Exclusions

 

  • Contractual Liability
    Unless this has been specifically added to the policy, coverage is excluded for any obligation you have entered into under a written contract. However, this exclusion does not usually apply to liability you would have in the absence of a contract.

 

  • Insured versus Insured Claims
    There are many variations to this exclusion, but the main purpose is to not cover a dispute between insureds and/or the company.

 

  • Prior & Pending Exclusion
    States that the policy will not cover any pending or prior litigation involving the Company that has begun before the Prior & Pending date of the policy.

 

  • Sanctions Exclusion
    Excludes claims where cover, payment, service, benefit and/or any business or activity would violate any applicable trade or economic sanctions, law or regulation.

 

  • Bodily Injury/Property Damage
    The policy will not respond to a Bodily Injury & Property Damage claim as this exposure is typically covered by a Public Liability policy. This exclusion usually has a write back (gives coverage back) for Defence Costs, Employment Related Wrongful Acts and Security Claims.

 

  • Retroactive Date Exclusion
    This excludes any wrongful act committed or alleged to have been committed prior to the inception of the policy. This is a way for insurers to exclude past acts and make the policy only forward looking.

 

** The above are general examples only; each insurance policy is different and standard exclusions may apply. Please read your PDS and contact your insurance advisor to review your specific policy. **

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

cyber insurance explained what it is and why you need it 1


 

Cyber Insurance provides cover for financial loss and expenses that businesses may suffer as a result of a Cyber Event, including cyber attacks from malware or other invasive software, cyber extortion and social engineering.Claims covered under a Cyber policy are very broad, but are typically three core things: Liability (privacy lawsuits and regulatory defence), Internal Financial Loss (extortion, notification expenses, data recovery, business interruption, crime/theft), and Emergency Incident Response (costs incurred from responding to a Cyber Event).

 


cyber insurance explained what it is and why you need it 2

A Cyber Event triggers a claim on a Cyber Insurance policy and can be caused by several different scenarios:

 

What are the Coverages Available?
Main Coverages that respond to a Cyber Event:

 

1. Privacy Breach Notification & Crisis Management Costs

 

When a cyber incident occurs, whether it is through some kind of invasive software (malware, ransomware), phishing or social engineering scheme, or other form of cyber attack, there is usually a privacy breach as a result – i.e. private or confidential information/data is exposed. This policy section provides cover for the costs associated with responding to a privacy breach, including:
  • Incident response costs and 24/7 emergency hotline – the people you call when a cyber incident has occurred;
  • Notifying third parties about the data breach, including mandatory notification (i.e. mandatory for companies with a turnover of $3M+) and voluntary notification to clients, service providers or otherwise;
  • Performing computer forensics to determine the existence, cause, and scope of a network compromise or data breach;
  • Public relations costs associated with mitigating any reputational harm; and
  • Providing credit or identity monitoring and identity protection for those individuals whose personal data was or may have been breached as a result of a network compromise or data breach.

 

2. Privacy & Security Liability

 

This section protects you from claims/lawsuits as a result of a privacy and security wrongful act, such as:

 

  • Loss, theft or failure to reasonably protect personal data or confidential business information;
  • Violation of privacy laws or data breach reporting requirements;
  • Failure to implement adequate privacy or network security practices;
  • Negligence resulting in a failure to prevent a network compromise that results in:

 

  1. Damage or loss of use to a third-parties computer system or data; and
  2. Transmission of malware or a denial of service attack to a third party;

 

  • Failure to comply with your privacy policy and/or privacy notice.

 

3. Cyber Extortion

 

Cyber extortion is defined as a threat against the insured computer system to provide ransom in order to prevent a Cyber Attack.Coverage for this can include: the payment of a ransom, negotiation & mediation costs, crisis management costs & costs to resolve a security threat, and investigation costs to determine the cause of the extortion threat.

 

4. Business Interruption – Loss of Profits & Operational Expenses

 

Coverage for loss of profits and additional operating expenses incurred because of a cyber event.

 

5. Data Recovery & System Damage

 

This section covers the costs and expenses for lost, damaged or destroyed IT systems, records, and data.This can include the retrieving, repairing, restoring or replacing of data or systems, including the removal of malware.

 

6. Regulatory Defence and Fines

 

This section provides cover for defence costs and regulatory fines that have resulted from a cyber incident, such as a privacy or security breach.

 

7. Media Liability

 

Coverage for the following incidents that occur from your information through traditional and digital media:

 

  • Libel, slander or any other defamation or harm to a third party;
  • Copyright infringement, intellectual property rights infringement, plagiarism or misappropriation of property rights;
  • Misstatement or misrepresentation under the terms of the Competition and Consumer Act;
  • Infliction of emotional distress or mental anguish; among others

 


 

Additional Coverage Sections and Policy Options:

 

1. Social Engineering & Funds Transfer

 

The fraudulent transfer or theft of funds caused by instructions made by a person purporting to be an authorized employee, outsourced provider or customer of yours.This coverage is typically sub-limited.

 

2. Contingent Business Interruption

 

Coverage for loss of profits and additional operating expenses incurred as a result of an interruption to a dependant business/supply chain partner, caused by a cyber event.

 

3. Payment Card Data Security Liability

 

Coverage for loss of profits and additional operating expenses incurred as a result of an interruption to a dependant business/supply chain partner, caused by a cyber event.

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article

what to do after a cyber attack or data breach 7 step plan 1


What is a Cyber Attack or Data Breach?

 

A cyber attack is usually associated with some sort of event that causes a loss, such as the outbreak of malware or other invasive software, cyber extortion or ransomware, and social engineering. A cyber event can also cause a data breach, which is defined as when personal information an organisation holds is lost or subjected to unauthorised access or disclosure.Companies are encouraged to do everything in their power to prevent a cyber attack from ever occurring, but these are inevitably going to happen to most companies at some point – 1 in 4 companies experience a cyber attack at least once according to recent statistics. This is why it is necessary to have some kind of cyber incident response plan; or at least an idea of what to do if you experience a cyber attack or data breach.

 

what to do after a cyber attack or data breach 7 step plan 2


7 Step Plan on What to Do Following a Cyber Event

 

what to do after a cyber attack or data breach 7 step plan 3

1. Identify The Breach

 

This may seem like an obvious step, but cyber breaches often occur without the victim even noticing – sometimes sitting in your system or on your computer for months before an actual attack occurs. Identifying the breach can be as simple as training staff to recognise a breach when it happens, to implementing sophisticated breach prevention software.No matter how this is done, it is important to identify a breach quickly, so you can respond to it right away. Once you’ve realised that a breach has occurred, you’ll need to identify what has happened and proceed to the next step – at this point you can contact your incident response team.

 

2. Contact Incident Response Hotline

 

Who do you call in the event of a cyber attack?One of the main reasons we recommend purchasing a Cyber Insurance policy is because it gives you immediate access to a 24/7 emergency hotline, so you have somebody to call in the event of a breach. This puts you in touch with experts who can sort out the problem efficiently and effectively – and the policy will pay for their services if the claim goes through.

 

3. Contain The Breach

 

At this point you have identified the breach, and if you have a cyber insurance policy, contacted the nominated incident response team; now you need to contain the breach, so it doesn’t get any worse. This step is typically handled by the incident response team or your internal/external IT team.

 

There will be certain steps the IT team (yours or the one nominated by the emergency response team) will take to restore your system’s security and resolve the breach; this can include:

  • Removing access to internal systems or changing passwords if a user’s account details have been compromised;
  • Taking parts of or your entire system offline;
  • Implementing temporary firewalls;
  • Blocking traffic to your website; or
  • Transferring important files to a secure location.

This can be a complicated process, which is why it’s important to have access to the specialists who can handle the situation appropriately and mitigate the problem before it potentially gets too severe.

 

4. Investigate The Breach & Assess The Impact

 

You have contained the breach, but still don’t know what exactly happened and the extent of the damages. This is when you would typically utilise a forensic IT specialist to dig into the cause and effect of the cyber event.Once the forensic IT has identified what occurred and the scope of the breach, you’ll be able to plan from there on how to respond to the event.

 

5. Recover Data & Systems

 

Once you have contained and eradicated the breach, you can begin the process to recover your IT networks, systems, and data to continue operating. Companies with a business continuity or disaster recovery plan would likely have a specific recovery plan incorporated for these types of situations. However, even if you don’t have a formal plan, your process should include the following:
  • A plan to restore systems to normal operation
  • A process of continual monitoring to confirm that the affected systems are functioning normally
  • A plan (if applicable) to remediate vulnerabilities to prevent similar incidents.

This is something your IT team should be able to assist with.

 

 

6. Communication & Notification

 

This step relies heavily on timing – it is important to hold off on certain communication (i.e. with clients, service providers, or those affected by the breach) until you know what exactly happened and the scope of the damages. In addition, you may also have specific notification requirements that will have associated timelines – we recommend you are aware of these in advance, to avoid missing deadlines and getting hit with fines and penalties.

 

  • Communicating with Clients & Service Providers:

 

This depends on the impact of the cyber incident – sometimes the event doesn’t warrant communication with these parties, in which case it is usually best practice to skip this step. Alternatively, communicating with these parties can be mandatory in certain scenarios and/or vital to your business. It is important to identify which of these options apply to your business, which is where your emergency response/crisis management team can assist.

 

If you are going to communicate with these parties, we recommend you wait until you have enough information to pass on a complete message to help avoid miscommunications and misunderstandings.

Consider these key messages when communicating with clients and service providers:

 

  • What happened and why did it happen?
  • What systems/services are affected?
  • What steps are being taken to resolve the situation?
  • Is it possible to say when the situation will be resolved?
  • What are external stakeholders expected to do?
  • Who can external stakeholders contact if they have questions/concerns?

Depending on the size of the cyber event and your business, it may be worth appointing a public relations firm to assist with the communication step.

 

  • Communicating with Regulators:

 

Certain rules & regulations around mandatory notification of privacy breaches may apply to your company. We recommend you know when to notify before any breach occurs, as you could face fines & penalties if you don’t notify within a specified time period.

 

7. Evaluation & Improvement

 

Use the information gathered in the previous steps to improve your cyber security measures. Not only will this strengthen your defence against future cyber attacks, but it will help your case with insurers when it is time to renew your policy.See our Top 10 Tips to Prevent A Cyber Attack here for more information on how to prevent a cyber event.

 


 

Tips & Tricks for a Cyber Incident Response Plan

 

Consider some of the below when establishing your breach response plan:

 

  • Don’t rely on digital make printed copies of your response plan, including important contacts (emergency response, IT provider, insurance broker);

 

  • Prepare your employees on what to do if a cyber incident occurs knowing what to do and acting quickly is integral to preventing or reducing a loss;
  • Give team members specific roles and responsibilities to respond to a cyber incident;

 

  • Educate employees on how to identify a cyber event.

 


 

Secure Your Association’s Future with Tailored Insurance Solutions from KBI

Protect your association’s future by partnering with a specialised insurance broker, KBI. With KBI’s Association Insurance Program, you gain comprehensive coverage designed to address your association’s unique risks. Don’t leave your success to chance—contact us today to discuss your insurance needs.

 

Let KBI be your trusted partner in protecting your association’s interests and ensuring long-term resilience. Together, we can navigate the complexities of risk management and insurance and secure a brighter future for your association.

Next

LOGO 1

We are a specialist insurance brokerage with an emphasis on adding value to our clients by helping them make an informed decision. Our approach combines that of an insurance broker and consultant, where we focus on providing expert advice to our clients while customising their insurance program and risk management solutions.

 

Since starting in 2013, KBI is constantly growing and becoming a leader in the Australian market. Our primary point of difference is that we don’t try to be all things to all people. We work in niche areas, where we can tailor an offering, advice and broker support to meet the specific area’s needs.

latest news

Related Articles

Why Do Associations Need a Tailored Insurance Program?

why do associations need a tailored insurance program

Associations play a key role in many industries. They represent the shared interests of professionals, businesses, and communities. Associations operate in dynamic […] {{ post.title }}>Read More

Why Do Associations Need a Tailored Insurance Program? Read Article

Strengthening Your Business with Comprehensive Cyber Insurance Solutions

strengthening your business with comprehensive cyber insurance solutions 1

In this article, we provide some key insight into the current cyber insurance landscape including how insurers are responding to increasing risks […] {{ post.title }}>Read More

Strengthening Your Business with Comprehensive Cyber Insurance Solutions Read Article

Safeguarding Business Continuity: Learning from the Optus Outage

safeguarding business continuity learning from the optus outage

In an era where connectivity is the lifeblood of businesses, the recent Optus outage in Australia served as a stark reminder of […] {{ post.title }}>Read More

Safeguarding Business Continuity: Learning from the Optus Outage Read Article