Think your business is too small for cyber insurance?

Think your business is too small for cyber insurance?

The general perception is that only large businesses have vulnerabilities to cyber breaches. In truth, small businesses are just as much of a target as large corporations. Hackers know that smaller businesses don’t invest as heavily in security or stay informed about the latest exploits. And, best of all, they typically have a treasure trove of personal and financial information.

Consider the worst possible scenarios and whether your company can fight off the threats. Preparing the technology to thwart cybercrime is your first defense and having breach insurance should also be considered.

Here's four reasons why you should invest in breach insurance BEFORE an incident… so you don't end up as another cyber breach statistic as your last defense.

1. Hackers Could Compromise Personal Customer Data

Other recent data shows only 29% of U.S. businesses invest in cyber breach insurance. Considering hackers are always ahead of the game on compromising data, you could become a hacking target virtually overnight. What's worse is that you may not realize you've been hacked until weeks or months later.

Once you find out, you may realize the stolen customer data was used to perpetrate identity theft. Recovering from this financially wouldn't be easy without breach insurance, especially if you face litigation from unhappy authorities and customers.

2. Ransomware Attacks

Another growing cyber breach category is ransomware, a type of malware that hijacks your network and demands digital cash in exchange for the keys to return your data to normal. Those who do this could keep hijacking your network, even if you pay the ransom. In the meantime, your business may not be operational for days or weeks and, in some cases, it might never recover financially.

Breach insurance helps you get back on your feet after experiencing a financial loss from cyberattacks.

3. Breaching PCI Standards

The Payment Card Industry Data Security Standard (PCI DSS) is a government regulation you may have to follow to ensure all credit card information stays safe. A hacking event could jeopardize this, leading to a major PCI violation.

Costs can become steep as the credit card companies look to recover their losses. Increased transaction fees or even a loss of your ability to process credit cards may occur.

4. The Overall Cost to Small Businesses

Data recovery costs for small businesses now run up to $36,000, with overall losses averaging $50,000. A big business can overcome this expense, but many small businesses may not be able to sustain this loss.

For all of these reasons, data breach insurance makes a lot of sense. This insurance will keep the business stable when an attack is beyond your technological control.

If you are contemplating breach insurance be aware that the insurer will ask questions about the security of your technology environment. Depending on the answers, you could be turned down until the remedies are completed. 

Typical questions include:

  • How often do you review the rules within the firewall?
  • Do you remove terminated employee access promptly?
  • Do you have a written business continuity plan?
  • Is sensitive data encrypted?
  • How soon can you restore lost data?
  • Is your network monitored in real time?
  • Are your employees periodically instructed on their responsibilities in regard to information security?

A Technology Management company can prepare your environment to meet the requirements for breach insurance. They also provide ongoing monitoring and management which will protect you; but with today’s sophisticated hackers your business needs an array of protections to truly stay safe.


Cyber insurance policy premiums are not "one size fits all." Be sure to weight all of the factors and consider using technology company to guide you through the application process.

回复
John Burton

Director of Research for the Vermont Futures Project

7 年

Many businesses that previously passed on Cyber Insurance are now regretting that decision. When was the last time you took another look at this kind of policy? You might be surprised how much sense it can make.

回复

要查看或添加评论,请登录

John Burton的更多文章

  • Ever wonder what a CIO does?

    Ever wonder what a CIO does?

    1 条评论
  • Preventing Business Banking Fraud Part II

    Preventing Business Banking Fraud Part II

    Any private data your business possesses, company and personal, can be predisposed to fraud. Is your organization…

  • 2 Looming Cybersecurity Deadlines for Government Subcontractors

    2 Looming Cybersecurity Deadlines for Government Subcontractors

    12/31/17 – The latest date that contractors and subcontractors can continue to maintain and receive new defense related…

    1 条评论
  • Deadline fast approaching for DOD manufacturers

    Deadline fast approaching for DOD manufacturers

    As you may know, many manufacturers with DOD contracts must be compliant with new cyber security requirements…

    1 条评论
  • Facing an IT Audit? Don’t Panic.

    Facing an IT Audit? Don’t Panic.

    IT audits are one of many tools to help manage risk and identify areas of your business that are not only open to…

    2 条评论
  • Do you trust your business continuity plan?

    Do you trust your business continuity plan?

    All businesses--regardless of size--have a digital presence. This mandates that both mundane and mission critical data…

    5 条评论
  • Hard to Cry for the WannaCry Victims

    Hard to Cry for the WannaCry Victims

    The WannaCry ransomware attack ended up causing tens of millions of dollars of damage when it encrypted important data…

    4 条评论
  • Discovering value at business trade shows

    Discovering value at business trade shows

    This post was written by our Marketing Coordinator Dawn McGinnis who is a veteran trade show exhibitor. If you try…

    3 条评论
  • Arrest bogus wire fraud

    Arrest bogus wire fraud

    Business owners are seeing a huge increase in attempted wire fraud. The FBI reports that this problem has cost…

    5 条评论
  • Taming the security monster in your printer

    Taming the security monster in your printer

    When the subject of security comes up, most businesses focus on their everyday devices such as PCs, laptops, tablets…

    2 条评论

社区洞察

其他会员也浏览了