Cyber Attacks: Everyone is a Potential Target

If train derailments on consecutive days resulted in 180 fatalities, the twin tragedies would dominate the news cycle and cause panic in some circles. But, few seem to acknowledge that every 48 hours, the same number of U.S. drivers and passengers die in motor vehicle crashes. Insurance companies are well aware, though. It's our job to observe the world differently.

So, when recent cyber breaches at retailers Target, Neiman Marcus and Michaels made a media splash and led to Congressional inquiries, we didn't overreact because we understand information theft is a constant threat that impacts companies on a daily basis. For every big, public incident like Target, there are probably scores more that go unreported. The risks are very real for all companies.

Significant events like Target help focus national attention on cyber security issues, but they also tend to distort the scope of the problem. The reality is that cyber crime is a broader problem that's not confined to tech companies and large corporations.

If you possess personally identifiable information on a lone employee or single customer, you have a cyber exposure. That data doesn't have to exist on a network, either. These days, holding any personal information — even if it exists only on paper — presents a potentially costly privacy risk that falls under the cyber umbrella. Loss can occur as a result of access to networks via stolen credentials or breaches, unsecured or lost mobile devices or malicious email or web links.

All companies, regardless of size, need adequate controls in place that minimize possible points of entry to their private information. Perhaps most importantly, they also need to understand what data they have, where they have it, and how they're protecting it. What are employees allowed to have on mobile devices? How is remote access monitored, including vendors? Is there a documented chain of command for handling sensitive paper documents? What is the company’s policy on USB drives? These are basic governance concerns all business leaders need to address.

Also see Demand for Cybersecurity Professionals Spiking

 

With controls in place, a company's next step is to revisit its cyber risk management strategy. Companies need to decide if exposures can be minimized by changing processes or the way data is stored. They must explore how those exposures can be mitigated with network security, privacy policies, training and expert assistance. And they should understand what risks can be transferred to third parties, and what risks should be retained.

Obviously, insurance is an important weapon in this war. According to one study, the average security breach costs organizations almost $200 for each record that's stolen, or about $5.5 million for the typical company breach. A claim that size could cripple a business without adequate insurance coverage. Ideally, it never gets to that point.

The challenge is to avoid claims and lawsuits by staying ahead of the risks, implementing controls and processes that prevent lapses, and building the strongest wall possible around all personally identifiable information.

This blog has been published with permission from CNA Insurance.

Readers are encouraged to respond to Valynda Murphy directly atvalynda.murphy@cna.com, or using the “Add Your Comments” box below.

The opinions of bloggers on www.insurancenetworking.com do not necessarily reflect those of Insurance Networking News.

For reprint and licensing requests for this article, click here.
Security risk Analytics Policy adminstration Data and information management
MORE FROM DIGITAL INSURANCE