It’s 2016 – Do you Know Where your Cyber Insurance Is?

10-18-16-cyber-risk-mitigation-graphicOrganizations that are seeking process efficiency and an edge on their competitors look toward technology to support their business plans. Often, new technology advancements will enhance an organization’s performance but unfortunately, the introduction of new software, systems and processes open them up to (unanticipated) cyber-related risk and exposures.

The Risk and Insurance Management Society (RIMS) released a study this month noting that 80% of the companies surveyed purchased a stand-alone cyber policy in 2016. A portion of those companies made the purchase due to contractual obligations, but it’s apparent that companies are beginning to see the criticality of the coverage.

With cyber risks stemming from such a wide variety of sources, cyber insurance is only one tool in the risk mitigation toolbox, but it is an extremely important one that might enable an organization to recover from what could otherwise be crippling expenses.

The following chart from the RIMS survey illustrates the cyber risks that are most relevant to the participating companies:

rims-relevant-cyber-risks-2016 RIMS 2016 Cyber Survey

While companies spend on smartening their workforce to cyber risks, implementing laptop and mobile device encryption, and installing advanced monitoring tools, it’s often the cyber insurance policy that fortifies a company when those measures fail and a cyber event does occur. However, those other risk mitigation techniques should by no means be minimized or ignored.

Keep in mind that cyber insurance forms and language have not yet been standardized across the marketplace, so it is of the utmost importance that someone with expert knowledge of the coverage reviews the proposed language before it is purchased. Depending on your business, a well-crafted policy should include coverage for privacy events, network business interruption, cyber extortion, fines and penalties, breach notification expenses, credit monitoring services, data recovery and, of course, legal defense expenses … just to name a few.

The takeaway here should be twofold:

  1. Cyber insurance is a critical component of any cyber risk mitigation strategy. (If you don’t have a policy, what are you waiting for?)

AND,

  1. A company such as The ALS Group, with a deep knowledge and expertise in cyber risk management and insurance should work with you to carefully construct the coverage that is appropriate for your organization.

Click here to request more information about The ALS Group or on limiting your cyber risk exposure.

Our areas of expertise include:

  • Enterprise Risk Management (ERM)
  • Cyber Security & Cyber Liability Insurance
  • Construction Management
  • Customized Risk Management Assessments (RMAs)

Subscribe to our articles

blog posts form
Form Submission Response

Dear [field id="name"],

Thank you for subscribing to The ALS Group articles! We are so excited to have you on board and look forward to providing you with valuable insights, risk management advice, and industry news.

As a subscriber, you will be the first to receive our latest blog posts straight to your inbox. In addition to the blog content, we have a wealth of resources on our website that we believe will be useful to you.

If you have any questions or require any risk management advice, please contact Albert Sica, Managing Principal, at [email protected] or at 732-395-4251.

Thank you,

The ALS Group

Skip to content