Cyber Risk Claims: An Inside View

As the interest in cyber insurance products escalates, getting a clearer view of claims trends is critical. NetDiligence, a cyber risk assessment and data breach services company, recently published a comprehensive analysis of reported data breach and other cyber event losses. Titled, 2016 Cyber Claims Study, the report was sponsored by OneBeacon Technology among others. Topics include the types of data exposed, causes of loss, business sectors involved, sizes of affected organizations, insider involvement, and third-party involvement. New analyses include:

  • Cloud involvement
  • Cyber extortion/Ransomware
  • Phishing
  • Phishing and wire transfer fraud
  • POS-related/common point of purchase/CPP investigations

Additionally, the costs associated with crisis and recovery services (e.g., forensics, notification, credit/ID monitoring, legal counsel and miscellaneous other), legal damages (defense and settlement), regulatory action (defense and settlement) and PCI fines are highlighted.

We invite you to download this whitepaper and to review our technology and life science library of whitepapers, visit our website resource library.

netdiligence_2016_claimsstudy_infographic-2

Digital Pirates Seek More Than Free Music

How many warnings have you seen about clicking on unfamiliar links or confirming email addresses to be sure it’s a known and trusted source? Typically the goal is avoiding a computer virus, but you also need to be aware of digital pirates eager to seize computer files in exchange for a ransom fee. Sound far-fetched? Hardly; ransomware has been around since 1989 and has become more widespread in recent years. These digital pirates are becoming cleverer, making avoiding these intrusions an important defensive concern.

We’re pleased to share our most recent whitepaper titled “Minimizing the Impact of Ransomware” authored by VP & Senior InfoTech Product Manager Joe Budzyn. As you’ll read, Joe defines ransomware, how it typically appears and steps for mitigating such an attack.

. Our complete library of technology-focused whitepapers is available on our website.

ransomware.