Why Cyber Insurance Is Worth It for Your Business and What to Consider
Sikich
|
Jan 11 2023
|
5 min read
The FBI found a 300% increase in cybercrime since the start of the pandemic in 2020.
How can you protect yourself against losses in the case of a breach?
In this article, we break down the what, how, and why of cyber insurance for your business. This article is for knowledge only. Always include your legal team in any discussions around cyber insurance.
What Is Cyber Insurance?
Cyber insurance is just what it sounds like: insurance to protect your business from financial losses that may be incurred during cyberattacks such as data breaches, system hacks, ransomware extortion, and other issues.
The Hiscox Cyber Readiness Report™ 2022 found that U.S. businesses are more concerned about cyberattacks than the pandemic or skills shortages. The report also noted that the median cost of an attack in 2022 was $18,000, up $10,000 from last year. Nearly half of businesses in the U.S. have experienced an attack.
The most common port of entry was a corporate server in the cloud.
Regardless of the size of your business, cyber criminals are opportunistic and will attack wherever they perceive an opening to make money. For this reason, cyber insurance may be a necessity to protect your business.
You will need to:
Understand your business level of risk.
Know your regulatory responsibilities.
Determine your budget.
The coverage you need will depend on the particulars of your business. For example, healthcare companies and others that handle sensitive information might be at higher risk for cybercrime. When considering your budget consider:
Are you prepared to meet the security standards required by the insurance contract?
How much would it cost to recover from a cyber attack? Remember to consider restoring lost data, repairing damage to business reputation (hiring a PR firm), and the length of recovery.
The cost of being sued due to a cyber attack, including the costs of hiring a lawyer, potential fines, and settlements.
Work with a broker to assess your business’s risk and recommend the right amount of coverage to fit your needs.
Cyber insurance usually excludes the following:
Property damage
Intellectual property (separate coverage)
Self-inflicted cyber incidents
Costs of cybersecurity/protective measures
Cyber Insurance Coverage Checklist
As you begin the conversation about whether cyber insurance is right for your company, ask these questions:
Where is all our sensitive data stored?
What safeguards are in place to protect the information?
Have we implemented a Risk Management Program?
How does Integration Solution impact my security posture?
If your data is lost in a cloud solution, what is your recovery plan?
How can I share the responsibility to protect my business and its data with all stakeholders?
Are your employees educated on cybercrime prevention? Reducing business risk starts with a comprehensive set of internal policies and an aligned cybersecurity education program.
As cybercrime ratchets up, securing coverage is getting more difficult. Meeting insurance carrier requirements is imperative. With cyber-related losses at an all-time high (with ransomware leading the way), cyber insurance carriers are requiring improved cyber hygiene in the form of risk controls.
The most important risk controls include:
Multifactor Authentication (MFA)
Endpoint Detection and Response (EDR)
24/7 Security Operations Center (SOC) and Monitoring
Network Backups
Network Segmentation/Update
Without securing the risk controls that carriers demand, your company will either not be able to obtain cyber insurance or may not be covered in the event of a cyberattack.
For those businesses that have cyber insurance, don’t wait to submit your renewal applications as new controls and technical components are updated daily. It no longer works to say that a company has certain controls in place; the underwriters will ask for proof of everything, such as MFA, as functioning at the time of the attack.
Compliance and Cyber Insurance
Businesses are required to follow privacy regulations set by various regulatory bodies. In addition, companies must adhere to various privacy acts. It’s up to business owners to know their obligations for protecting sensitive personal information. Keep in mind: Insurance policies may not cover businesses not compliant with local policy regulations.
A few of the most well-known privacy acts are the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA). GDPR and CCPA apply to all companies who store and process data belonging to EU citizens and California residents regardless of where the company is located.
The Cybersecurity Maturity Model Certification (CMMC) is another regulation. CMMC requires formal third-party audits of defense industrial contractors to ensure DoD contractors properly protect sensitive information.
How Sikich Can Help with Cyber Insurance
Given the requirements of a good cyber insurance policy, it’s clear any business will need solid cybersecurity in place to make a successful claim if there is a breach.
Sikich can help you maintain your cyber hygiene. We offer Tech 360 Managed Security Services, 24/7 monitoring with Endpoint Detection and Response (EDR) and a Security Operations Center (SOC), multifactor authentication (MFA), network backups, professional IT services, network segmentation, security audits and assessments, security testing and consulting, and forensics and incident response.
Give us a call today to set up a consultation, and watch our recent webinar, Strategic Guidance for Everchanging Cyber Insurance, below.
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Sikich
Sikich is a global company specializing in technology-enabled professional services. With more than 1,900 employees, Sikich draws on a diverse portfolio of technology solutions to deliver transformative digital strategies and is comprised of one of the largest CPA firms in the United States. From corporations and not-for-profits to state and local governments and federal agencies, Sikich clients utilize a broad spectrum of services* and products to help them improve performance and achieve long-term, strategic goals.
*Securities offered through Sikich Corporate Finance LLC, member FINRA/SIPC. Investment advisory services offered through Sikich Financial, an SEC Registered Investment Advisor.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Infographic: Hamilton Company Achieves Scalability with Micr...
April 14, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Infographic: Hamilton Company Achieves Scalability with Micr...
April 14, 2025
Hamilton Company, a global equipment manufacturer, was instrumental in meeting the surge in demand for laboratory and medical testing products during...
Why Upgrading to Microsoft 365 is Essential for Modern Busin...
April 11, 2025
Office 365
Why Upgrading to Microsoft 365 is Essential for Modern Busin...
April 11, 2025
Upgrading from an on-premises Exchange server to Microsoft 365 is a significant decision that can bring numerous benefits to your organization. Here ...
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Customizations: Managing the Human Element in Production Pla...
April 10, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Customizations: Managing the Human Element in Production Pla...
April 10, 2025
Manufacturers pride themselves on efficiency: optimized workflows, predictable lead times, and streamlined production processes. But when customizati...
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Preventive Maintenance in Dynamics 365
April 9, 2025
Dynamics 365>Dynamics 365 Finance and Supply Chain Management
Preventive Maintenance in Dynamics 365
April 9, 2025
For any business, ensuring the efficiency of systems is crucial for maintaining seamless operations. For equipment maintenance professionals, managin...
Leveraging Technology for Compliance and Risk Management in ...
April 9, 2025
Security
Leveraging Technology for Compliance and Risk Management in ...
April 9, 2025
In the logistics industry, compliance and risk management are critical for maintaining operational efficiency, ensuring regulatory adherence, and pro...
Navigating Compliance and Risk Management in Legal & CPA...
April 8, 2025
Security
Navigating Compliance and Risk Management in Legal & CPA...
April 8, 2025
Legal and CPA firms face unique compliance and risk management challenges. This article explores these challenges and offers strategies to ensure com...
Validation Beyond Just Meeting FDA Requirements is Crucial
April 7, 2025
Life Science
Validation Beyond Just Meeting FDA Requirements is Crucial
April 7, 2025
The landscape of the life sciences industry is constantly evolving, and with it, the regulatory oversights. Recent layoffs might have impacted some o...
Microsoft Entra ID P1 vs. P2 Licensing: Understanding the Di...
April 4, 2025
Technology
Microsoft Entra ID P1 vs. P2 Licensing: Understanding the Di...
April 4, 2025
Managing digital identities and access is crucial for any organization. Microsoft Entra ID, formerly known as Azure Active Directory, offers two prim...
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.