Why cyber insurance protection is mission-critical for your business – Security Magazine




Image via Freepik
Ransomware attacks have made cybersecurity top of mind for global businesses. What is increasingly getting more attention, though, is the connection between cybersecurity and cyber insurance.

Consider a couple of noteworthy statistics, according to new research that’s focused on cybersecurity trends for mid-sized organizations: 
●   Cyber insurance uptake is significant, with 100% of companies stating they have cyber insurance. 
●   In addition, cyber insurance premiums have continued to increase. Nearly half of organizations (47%) experienced premium increases of 76% or more in the past year. 

Ransomware is a major driver for these cyber insurance premium increases. Furthermore, an organization’s ability to manage ransomware effectively is a key factor in the cyber insurance renewal process. Proactively addressing ransomware is especially critical for companies in the mid-sized range, given that they are typically tight on IT resources. And, the higher the risk companies experience from malware, the harder it can be to obtain coverage. 

While cyber insurance can significantly impact a company’s bottom line, adhering to the cybersecurity hygiene and data protection practices below can mitigate the risk of rapidly evolving threats and keep premiums manageable.
●   Reduce data sprawl. Over half of mid-sized organizations manage 10 or more file repositories (e.g., email, collaboration/productivity tools, personal devices, and unauthorized cloud storage). By addressing data sprawl, organizations can reduce their overall attack surface and increase users’ productivity.
●   Utilize multi-factor authentication (MFA) and practice defense in depth. Cyberattackers try to locate sensitive data the fastest way possible and with the least amount of resistance. Implementing MFA is an effective protection strategy that generates rapid benefits, especially for organizations with limited IT security budgets. Previous research from Microsoft indicates that those who enable MFA can block up to 99.99% of automated account hacks. Ultimately, the best security protection is multi-layered, meaning that organizations should implement a combination of anti-virus protection, data encryption, and intrusion detection systems. 
●   Take insider threats seriously. Companies should assume that everyone is a potential insider threat. Why? As ransomware and insider threats continue to converge, there have been instances in which ransomware gangs work with company employees directly to facilitate attacks. By centralizing their data views to understand what content is being accessed, and by whom, organizations can detect potentially malicious activity by recognizing commonplace user behavior and patterns. It is recommended that companies also limit users’ file access based on a ‘business need to know’ basis. 
●   Implement ransomware detection and recovery solutions. Organizations can put technology on their side by investing in a solution that can detect ransomware signatures and flag unusual file behavior, such as high-volume encryption activity. These platforms can also allow businesses to “roll back” to previous versions of important files should an attack occur.

In addition to the best practices outlined above, a particularly effective defense strategy is to create a comprehensive incident response plan and keep it up to date. Only 64% of mid-sized organizations have a formal incident response plan. Without an overarching plan, it is much more difficult for businesses to recover from cyberattacks.

One of the best ways for businesses to jump-start an incident response plan is to practice via tabletop exercises. Just as a company executive prepares before a major presentation, organizations must practice their incident response plan before an incident occurs. These tabletop exercises should involve all major organizational functions like executive and corporate communications so that key stakeholders can discuss and fine-tune their roles and responsibilities in response to future incidents. Typically, these exercises are moderated by a facilitator or project sponsor.

As far as what an effective incident response plan looks like, there are a few essential components. An incident response plan should include a mission statement and formal documentation of roles and responsibilities. There must also be documentation for cyber threat preparation — the processes currently in place to prevent and respond to cyber-attacks — and documentation for incident detection, such as reporting for unusual activity and social engineering exploits.

After a detected incident is documented, a decision must be made on whether the organization’s incident response plan should be activated. This is vital, as defining an incident too narrowly could result in a less effective response, while too broad of an approach could tie up valuable resources by responding to minor incidents. 

Once an incident is officially declared, there needs to be a process in place to manage and contain the incident effectively, including unplugging all impacted machines from the network and interviewing affected users. There should also be recovery plans that are laser-focused on re-establishing business productivity, such as testing affected systems before bringing them back into production and announcing the formal closure of the incident. Finally, a post-incident review should always be completed to detail key takeaways and, ideally, prevent the incident from happening again.

The cyber insurance marketplace has experienced unprecedented changes over the past few years. There have been large payouts from ransomware attacks, while companies have been susceptible to supply chain risk, and new threat vectors have emerged as a result of the shift to hybrid/remote work. All of this has influenced how cyber risks are perceived and evaluated. 

What has not changed, though, are the strategies that organizations, especially mid-sized businesses, can leverage to protect themselves against potential cyberattacks. Similar to how a good driving record can help reduce car insurance rates, there are simple things that organizations can do to minimize cyber insurance premium increases. Perhaps most importantly, all companies should have a formal incident response plan, including recommended processes to communicate with legal counsel, employees, and external stakeholders.
Subscribe to Security Magazine
Neil Jones is director of cybersecurity evangelism at Egnyte.
You must have JavaScript enabled to enjoy a limited number of articles over the next 30 days.
Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.
SEC shooter detection webinar
Far too many organizations throw money at cybersecurity software and expect security professionals alone to protect the company, its people, and its assets from cyberattacks.
The 2022 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners.
 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 
Copyright ©2022. All Rights Reserved BNP Media.
Design, CMS, Hosting & Web Development :: ePublishing

source


CyberTelugu

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top