Cyber-Insurance Firms Limit Payouts, Risk Obsolescence

  /     /     /  
Publicated : 23/11/2024   Category : security


Cyber-Insurance Firms Limit Payouts, Risk Obsolescence


Businesses need to re-evaluate their cyber-insurance policies as firms like Lloyds of London continue to add restrictions, including excluding losses related to state-backed cyberattackers.



Companies will need to re-evaluate their cyber-insurance premiums after major insurance companies have adopted exclusions for catastrophic cyberattacks conducted by state-backed actors.
This limits the risk that companies can offset with cyber insurance, security and risk experts tell Dark Reading — making taking out a policy potentially not worth it.
In the latest limits on cyber policies, insurance marketplace
Lloyds of London
 issued a notice on Aug. 16 to its member insurers, or syndicates, requiring that they exclude coverage for state-backed cyberattacks. The motive for the additional restrictions is to protect insurance companies and their underwriters from catastrophic loss, and help manage systemic risk that could overwhelm insurers, Lloyds market bulletin stated.
While the insurers position is understandable, businesses — which have already seen their premiums skyrocket over the past three years — should question whether insurance still mitigates risk effectively, says Pankaj Goyal, senior vice president of data science and cyber insurance at Safe Security, a cyber-risk analysis firm.
Insurance works on trust, [so answer the question,] will an insurance policy keep me whole when a bad event happens? he says. Today, the answer might be I dont know. When customers lose trust, everyone loses, including the insurance companies.
The cyber-insurance industry has seen profits decline sharply in the past decade, as losses jumped from 35% of the revenue from premiums five years ago, to 72% in 2020. To adapt, insurance companies have dramatically raised the cost of policies — by 74% just in 2021, after rising 22% in 2020,
according to FitchRatings
.
Yet, insurance firms have also focused on limiting their liability. In 2021, global insurance firm AXA
decided to stop paying ransoms to cybercriminals
. And over the past two years, insurance companies have
added act-of-war exclusions
to their policies.
In
its market bulletin
(PDF), Lloyds argued that the risk posed by cyberattacks continues to evolve and its members need to adapt to the threats posed by large or widely distributed attacks. While wartime risks are often excluded, Lloyds requires that syndicates go further and ensure that certain policies have a suitable clause excluding liability for losses arising from any state-backed cyberattack.
If not managed properly it has the potential to expose the market to systemic risks that syndicates could struggle to manage, the insurance facilitator stated. In particular, the ability of hostile actors to easily disseminate an attack, the ability for harmful code to spread, and the critical dependency that societies have on their IT infrastructure, including to operate physical assets, means that losses have the potential to greatly exceed what the insurance market is able to absorb.
The decisions come after pharmaceutical firm Merck won its lawsuit against its insurers after they
refused to pay its $1.4 billion in business losses
sustained in the NotPetya crypto-ransomware attack in 2017. The judge in the case
ruled that the insurance policies act-of-war exclusion did not apply
, because the clause was meant to only exclude losses during armed conflicts.
Regardless, the policy changes are poorly thought out, some argue. 
 Signs point to continued breaches and hacks, resulting in a longer claims process, and more litigations, says Goyal. Unless the industry can collectively fix the way cyber insurance policies are understood, written and priced, ensuring that they are based on actual data and individual organizational risk — one size does not fit all — there is no end to the challenges and mistrust in cyber insurance.
The key problem is that the term state-backed cyberattack could be a very broad exclusion, and if abused by the insurance industry, one that will scuttle the usefulness of cyber insurance, experts say.
Attributing an attack to a nation-state is notoriously difficult, says James Turgal, vice president of cyber-risk and strategy for Optiv, a cybersecurity consultancy.
Even if a computer involved in the attacks was traced back to an IP address located in an Iranian or North Korean military base, that doesnt necessarily mean that it was an attack done with the knowledge of or at the direction of the governments authorities, he says. It could have been compromised by hackers in other countries [as a false-flag attempt].
Currently, almost two-thirds of companies — 64% — suspect that they have been either directly targeted or impacted by a nation-state attack, says Kevin Bocek, vice president of security strategy and threat intelligence at Venafi. Many of the major sources of cyberattacks against North American, European, and Asian companies come from cybercriminal groups linked in some way with China, Iran, North Korea, or Russia. Whether that link will equate to being state-backed is an open question.
These companies are clearly going to be worried about whether insurers will deem most attacks to be nation-state sponsored, he says. As a result, we expect most businesses that are serious about security to double down on their efforts to protect themselves from hackers in the first place.
Insurers will have to develop clear guidelines regarding what evidence and data will be used to determine the attribution of an attack, and what behavior patterns or data points they will consider in determining whether an attack is state-backed, he says.
Indeed, the exclusion will likely result in fewer companies relying on cyber insurance as a way to mitigate catastrophic risk. Instead, companies need to make sure that their cybersecurity controls and measures can mitigate the cost of any catastrophic attack, says David Lindner, chief information security officer at Contrast Security, an application security firm.
Creating data redundancies, such as backups, expanding visibility of network events, using a trusted forensics firm, and training all employees in cybersecurity can all help harden a business against cyberattacks and reduce damages.
Organizations cannot just rely on their cyber insurance policy and must proactively protect themselves from these catastrophic cyberattacks, Lindner says.
Companies also should not expect insurance firms to reverse course. Their approach is just a continuation of the industrys reactive approach to cyber insurance, says Safe Securitys Goyal. Insurance firms have increased premiums, put sub-limits on ransomware, and now, have adopted arguably broad exclusions, which may just result in delayed payouts and an increase in lawsuits when insurers refuse to pay out on a large policy.

Last News

▸ Sony, XBox Targeted by DDoS Attacks, Hacktivist Threats ◂
Discovered: 23/12/2024
Category: security

▸ There are plenty of online tools for reporting bugs. ◂
Discovered: 23/12/2024
Category: security

▸ 27 Million South Koreans Hit by Online Gaming Theft. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cyber-Insurance Firms Limit Payouts, Risk Obsolescence