Explaining the Value of Cyber Insurance!

Explaining the Value of Cyber Insurance!

In today’s current cyber threat landscape, it is imperative that companies ensure that they have a 360 degree cyber strategy to ensure that the risk to the business is mitigated. A 360 degree cyber strategy not only includes risk prevention measures such as firewalls, multi factor authentication, a solid password & access policy and business continuity plans etcetera but it also includes a solid cyber insurance policy in the event the prevention measures are not enough!

However, take up of Cyber Insurance is not where it should be considering the added value it can bring to your client’s risk management portfolio, therefore how do we convey the value and necessity of having a cyber policy to our clients?

Key Selling Points Of A Cyber Policy

Premium vs Value

Cyber Insurance policies may be an additional expense to your client’s insurance portfolio spend, however, the value of the cover that is derived from such a policy far outweighs the initial premium spend. Initial computer forensics and reinstatement of data after a cyber attack can run into the 10s of 1000s of dollars not to mention the damage to your client’s finances after paying a ransom or a fraudulent invoice. Typical cyber claims that we have seen can reach the 6 figure mark whilst premiums are only a small percentage of this! – This provide excellent value for money for the client and is one of the most important selling points of a cyber policy.

First Party Cyber Coverage Including Invoice Fraud & Ransomware

First party cyber insurance provides cover for financial losses caused as a result of a cyber event. This can include computer forensics costs, data restoration, securing the network, notification costs and much more. These services can run a cyber claim into the hundreds of thousands without dealing with any third party claims.

Invoice Fraud & Ransomware are two of the most common cyber claims seen across the market and can have a huge financial impact on your client. With financial losses running into the thousands, it is vital your client carries cyber crime insurance to mitigate this.

Third Party Cyber Coverage

Whilst most are concerned about first party financial losses, many forget that a claim could arise against the client by third parties that have also been affected by the cyber-attack. Cyber insurance can help provide cover should a claim arise from breaches in personally Identifiable Information (PII), breach of contract, negligent protection of data, network security breaches, transmission of viruses and denial of service attacks all of which are incredibly expensive claims.

Claims Examples

Providing some context as to the value of a cyber policy, below are some key case study examples we have seen recently which highlights how a cyber event could affect one’s business and finances:

An online CRM platform where, after a ransomware attack, clients could not access the platform and new users could not sign up -Total Claim Value $72k including payment of ransom and business interruption losses

A fraudulent invoice paid by an accounts team of a concrete supplier – Total Claim Value $127k including $60k invoice fraud and $67k in computer forensics and securing the network.

Online toy retailer suffered a DDOS attack bringing down the website – Total Claim Value £216k including business interruption losses totalling £120k and the remainder being restoration services and computer forensics.

Summary

Ensuring your client has a well-rounded insurance portfolio including cyber insurance is key to their risk mitigation strategies and, as illustrated above, the value that is provided far outweighs the consequences of a cyber event.

Should your client need a best-in-class cyber policy to manage their cyber exposures, please do get in touch. We work with the world’s leading cyber insurers and can source a bespoke policy suited to your client’s needs.

George Grimshaw

Account Executive - Cyber & Technology

Jensten Insurance Brokers

George Grimshaw BSc (Hons) Cert CII

Protecting Digital Futures: Cyber & Technology Insurance Specialist | Risk Management Strategist | Safeguarding Tomorrow's Technology Today ??

4 个月

Get in touch with the team at [email protected]

回复

要查看或添加评论,请登录

George Grimshaw BSc (Hons) Cert CII的更多文章

  • Selling The "Idea" Of Cyber Insurance

    Selling The "Idea" Of Cyber Insurance

    As cyber threats grow in sophistication and frequency, the demand for robust risk mitigation strategies, including…

    2 条评论
  • Jensten Technology, Media & Cyber – November Updates

    Jensten Technology, Media & Cyber – November Updates

    One month into Q3 and it has been nonstop here at the Jensten Technology, Media and Cyber (TMC) team and with two…

  • What Is Security Information & Event Management? (SIEM)

    What Is Security Information & Event Management? (SIEM)

    Coming to the end of my risk management series promoting the principles behind Cybersecurity Awareness Month we are…

    2 条评论
  • What is Privileged Access Management? (PAM)

    What is Privileged Access Management? (PAM)

    Next up in my series of newsletters during cybersecurity awareness month is Privileged Access Management or otherwise…

    2 条评论
  • What Is Penetration Testing?

    What Is Penetration Testing?

    In my second newsletter for Cybersecurity Awareness month, I am posting another article on the various elements of…

  • What Is Vulnerability Scanning?

    What Is Vulnerability Scanning?

    In this week’s article and in keeping with Cybersecurity Awareness month, I am continuing with my articles on aspects…

    2 条评论
  • Jensten Technology, Media & Cyber - October Updates

    Jensten Technology, Media & Cyber - October Updates

    After taking a small break due to a very busy end of September, I am getting back on the keyboard for another update…

  • What is Endpoint Detection and Response (EDR)?

    What is Endpoint Detection and Response (EDR)?

    EDR refers to security solutions designed to monitor, detect, and respond to threats on endpoint devices in real-time…

  • What is Multi Factor Authentication? (MFA)

    What is Multi Factor Authentication? (MFA)

    Multi-Factor Authentication, also known as MFA, is a security mechanism that aims to enhance the protection of user…

  • Jensten Technology, Media & Cyber - September Updates

    Jensten Technology, Media & Cyber - September Updates

    Another month and another update here from the Technology, Media and Cyber team at Jensten! Below the article will…

社区洞察

其他会员也浏览了