In this article, we’ve worked with CT Group to explore cybercrime and cyber insurance in 2022 – including how to mitigate cyber risk and how to address a key cyber related exposure: business interruption.
Table of Contents
|
|
Remote Work Fuels Cybercrime
Cybercrime has been around since 1834 — when hackers breached the French Telegraph system and accessed stock market data. Since the 1830s, technology has developed exponentially, and so has cybercrime.
In a survey by McAfee, two-thirds of responding companies experienced a cyber incident in 2019. The average reported cost for each company’s most expensive breach was over $500,000.
Since 2019, the rise of remote work has only fuelled the fire. According to the Australian Cyber Security Center, cybercrime reports rose 13% in FY2020-21. Head of the Australian Cyber Security Center, Ms Abigail Bradshaw CSC, commented: | As we shifted online to go school work or work from home or buy things, or keep communicating, the criminals have also shifted and really prosecuted our online lives to make money or steal our information.
A recent Open VPN poll supports this statement. Among respondents, 73% of VP and C-Suite level IT managers believed that remote workers pose a greater cyber-security threat than on-site workers.
Companies need to accept that they are constantly exposed to the very real and increasing threat of cybercrime, and that cybercriminals are proactively and constantly trying to find ways to attack unprepared victims. |
Key Cyber Risks Businesses Are Facing Now
If your business is reliant on computers to function, a cyber-related business interruption can have a massive impact on turnover. In extreme cases, malicious attacks can hinder your ability to generate income for weeks or even months.
In 2022, cybercriminals are more vicious and dexterous than ever before. And, as businesses trade static workstations for a more ‘fluid office’ the threat of cyber-attacks has increased exponentially. Today, even organisations with advanced security and firewall technology are at the mercy of cybercriminals.
Key cyber risks include:
1. Inadequate passwords:
2. Phishing assaults
Like password-related hacks, phishing attacks take advantage of human error. What makes phishing so effective is that through the social distribution of links and files, victims often inadvertently propagate malicious content.
3. Malware
4. Trojan viruses
5. Crytopjacking | 6. Ransomware and extortion Ransomware can be described as malware’s nastier cousin. Ransomware encrypts your files in a way that is nearly impossible to remove without the necessary software codes. Organisations can be held to exorbitant ransoms to free their systems and data. Although ransomware has been around for many years, 2021 saw increased ransomware complexity. New trends include:
The risks associated with these threats are different for individuals and businesses.
Password breaches: The scale of a password breach is generally larger for a business than an individual. An organisation-wide breach can compromise the classified data, personal information or even bank accounts of thousands of clients.
Phishing: The impact of phishing depends on what information is accessed by the hacker. Individuals tend to be targeted for identity theft, while businesses tend to be targeted for bank account access.
Malware: Malware can result in the total loss of company data, or company client lists with costs running into the millions.
Ransomware: Ransomware attacks are by far the costliest. And unfortunately, they are becoming increasingly more frequent. According to Coverware, in the first quarter of 2021, there was a 43% increase in the demands from cybercriminals, averaging an extortion cost of $220k. This cost is exclusive of productivity loss, loss of system and network access, data loss, damage to brand reputation, client loss and loss of revenue. Extortion costs aside, the IT manpower and hours required to solve these onslaughts, is enormous. They can easily take weeks, if not months, to resolve and run into millions of dollars.
The below chart shows cybercrime statistics for the 20/21 financial year. It is a good indication of how prevalent cybercrime is in Australia at the moment. |
Cyber Business Interruption – The Costs
Most businesses are aware of potential expenses related to repairing operating systems, regaining system access and addressing data breaches following a cyber attack. But, many overlook a critical exposure: business interruption.
An attack related outage can cost your business thousands in lost profits and unexpected expenses. In a survey by McAfee, in 2019 the average length of a responding business’s longest cybercrime-related interruption was 18-hours. For more than 33% of respondents, attack-related system downtime cost between $100,000 and $500,000. | Cyber business interruption examples:
In 2017 the LA Times reported that a NotPetya worm attack interrupted business at Danish shipping company Maersk for two weeks at a cost of $200-$300 million.
According to Computer Weekly, a 2020 cyber-attack left Avon representatives in several countries unable to place orders. Parts of the Avon UK system remained down more than a week after the incident. |
Mitigating Your Cyber Risk & Cyber related business interruptions
In addition to understanding the risks, and insuring against them, it’s probably most important to ensure companies are preparing for, and mitigating key risks. CT Group has provided a list of tactics all businesses should undertake to manage and reduce their exposure to the growing threat of cybercrime:
|
|
What Is Cyber Business Interruption Insurance?
Cyber insurance is a package of coverages that respond to losses associated with a cyber attack. The package can include cover for:
In some — but not all — cases, your cyber policy may include business interruption cover, which is arguably one of its most important coverage sections. Similar to traditional loss events like fire or flood, having insurance to restore operations following a cyber event is only useful if the business is able to survive through the restoration period. | The intention of cyber business interruption cover is to cover the revenue you would have earned if you had not experienced the cyber event. It can also cover additional expenses incurred to continue operating as best you can while the insurers help you recover from the loss.
If your Cyber policy does not include cyber BI cover, it is strongly recommended that you either add it to your existing policy or seek an alternative policy with more comprehensive coverages.
Unfortunately, organising Cyber BI cover is not simple. As a new and evolving form of insurance, cover terms can differ from insurer to insurer, and understanding what is best for your businesses can be confusing. |
What Does Cyber BI Insurance Cover?
The insurance market has not yet settled into a standard way of covering cyber business interruption, which means policy terms can vary significantly between insurers.
➤ Loss of income
➤ Operating expenses
➤ Additional expenses | Your policy may also include or have an option to add:
➤ Forensic expenses
➤ Contingent business interruption (also called dependent business interruption.) |
How Is Cyber Business Interruption Loss Calculated?
The way income loss is calculated will depend on your insurer and your policy. The process often includes consultation with forensic accountants and technology experts.
Some things worth noting are:
|
|
What Might a Cyber Business Interruption Claim Look Like?
It’s really difficult to say what a Cyber BI claim will look like. Terms vary significantly from insurer to insurer. And, since the settlement is often put together at the discretion of a forensic accountant. Some fictitious and slightly simplified examples of claims are below. These can help you to understand some different aspects of cover – but should not be considered representative of an actual claim. Example 1.
Situation:
Your Policy:
Result: | Example 2:
Situation:
Your Policy:
Result: |
Ensuring Your Policy Is Fit-For-Purpose
Especially for complex policies like cyber business interruption, it would be extremely beneficial to work with a specialist broker who can properly review your requirements and align the best solutions to them. | A specialist insurance broker will also:
|
Final Takeaways
| Should you need more information on Cyber Insurance, please contact the KBI team on 1300 907 344 or visit our cyber insurance page
Should you need more information on Cyber Security, please contact the CT Group team on 1300 434 237 or email solutions@ctgroup.com.au |
Disclaimers
All information on the document is provided in good faith, and while significant care has been taken to ensure the information is conveyed in the intended manner, we make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability or completeness of any information on the document. | Under no circumstance shall we have any liability to you for any loss or damage of any kind incurred as a result of the use of the document or reliance on any information provided on the document. your use of the site and your reliance on any information on the site is solely at your own risk. |
External Links Disclaimer
The Site may contain (or you may be sent through the Site) links to other websites or content belonging to or originating from third parties or links to websites and features in banners or other advertising. Such external links are not investigated, monitored, or checked for accuracy, adequacy, validity, reliability, availability or completeness by us. | WE DO NOT WARRANT, ENDORSE, GUARANTEE, OR ASSUME RESPONSIBILITY FOR THE ACCURACY OR RELIABILITY OF ANY INFORMATION OFFERED BY THIRDPARTY WEBSITES LINKED THROUGH THE SITE OR ANY WEBSITE OR FEATURE LINKED IN ANY BANNER OR OTHER ADVERTISING. WE WILL NOT BE A PARTY TO OR IN ANY WAY BE RESPONSIBLE FOR MONITORING ANY TRANSACTION BETWEEN YOU AND THIRDPARTY PROVIDERS OF PRODUCTS OR SERVICES. |
FAQs
➤ In most cases, cover is limited to a privacy or security breach. But, there are some situations where extended coverage is available for other outages.
➤ Your insurer will only be responsible for covering lost profit and additional expenses for the period agreed on in your policy. This period differs significantly from insurer to insurer, and the option you pick can drastically affect your position in the event of a claim.
Some typical timeframe based limitations include:
|
➤ Many policies expect the insured to cover a portion of losses. This can be called the retention, excess, deductible, or waiting period, and it might be defined as losses within a period of time, a dollar amount, or both. Like most things in Cyber BI insurance, retention details vary significantly from policy to policy.
Common Cyber BI retention terms include:
There is no one-size-fits-all rule. The type of cover that is right for you will depend on many factors, including your operations, your operating costs, your cash flow, the complexity of your systems, and your core vulnerabilities. In our opinion, the best option is always to consult an expert broker.
Even among companies in the same industry, needs can vary:
Take a 24-hour outage for an online store. Some stores are confident that customers will come back the next day, while others are not. Some stores will lose a single order per customer, while others will lose months of subscription or follow-up purchase income. |