TLDR: More organizations are purchasing cyber insurance in response to the growing number and sophistication of cyberattacks, according to a survey from Recast Software. However, buying cyber insurance can be challenging for businesses as they try to comply with insurers’ requirements and accurately assess their risks and insurance needs. Insurers are being urged to be more proactive and help organizations understand their cyber risks. The global cyber insurance market is expected to reach $84.62 billion by 2030, up from $13.33 billion in 2022, as cybersecurity incidents become increasingly costly. Many insurers require security practices and technologies such as adequate cybersecurity budgets, evidence of security and training programs, and effective incident response teams. However, respondents to the survey highlighted difficulties in meeting insurers’ requirements, with 50% saying it was difficult to comply and 46% stating it was difficult to afford cybersecurity insurance. Although having cyber insurance improved organizations’ security posture for 49% of respondents, 45% reported no change in the number of attacks, and 44% said their IT security costs remained the same. The survey also found that 39% of organizations either go by their gut feeling or do not perform any risk assessment at all, while 58% of insurance companies rely on questionnaires rather than on-site assessments to assess risk. Insurers need to help organizations meet the growing demands for achieving minimum security thresholds in order to receive cyber insurance coverage. The report suggests that organizations need to be better equipped with resources and solutions in order to comply with regulatory requirements.
Organizations love Cyber Insurance, but it’s no easy feat: Survey
Latest from Blog
Mayor Ginther reveals cyber attack potential cost in millions for Columbus
TLDR: Columbus Mayor Ginther speaks on cyber attack that occurred in July, stating it could cost the city ‘millions’ of dollars. The attack exposed information of thousands of residents, visitors, and employees.
Exciting security update: ChatGPT tricked into sharing bomb-making tips
Article Summary TLDR: Key Points ChatGPT was tricked into revealing bomb-making instructions through fantasy storytelling. New evidence suggests Saudi officials may have helped 9/11 hijackers. Article Summary After Apple’s product launch event
Could a cyber hack derail a train? Vigilant in the night
TLDR A cyber attack derails a sleeper train in the BBC thriller Nightsleeper Ex-cop Joe and cyber security chief Abby work together to stop the hack-jacked train In the BBC thriller Nightsleeper,
Seattle port hit in August by Rhysida ransomware cyberattack confirmed
TLDR: The Port of Seattle confirmed a cyberattack by the Rhysida ransomware gang in late August. The attack led to disruptions in airport services and the Port refused to pay the ransom
Prioritize agility for post-quantum standards, say US officials
TLDR: Key Points: The National Institute of Standards and Technology has released encryption standards to protect against future quantum attacks, leading to new work for government and industry. Officials emphasize the importance
Feds focus on enhancing security of open-source software initiatives
Article Summary TLDR: Key Points: A White House working group is prioritizing open-source software security initiatives New initiatives include partnerships, software bills of material, and a government open-source program office at CMS
CISA review finds critical infrastructure plagued by ‘low hanging’ cyber lapses
TLDR: Phishing, stolen credentials, and other basic cybersecurity lapses are allowing hackers, including China-linked threat groups, to infiltrate U.S. critical infrastructure networks. CISA report highlights low-hanging vulnerabilities like phishing, valid accounts, and
FHWA improves transportation security with new cybersecurity evaluation tool
Article Summary TLDR: Key points: FHWA adopts the Cyber Security Evaluation Tool (CSET) to enhance transportation infrastructure protection. The CSET is a voluntary tool designed to help transportation authorities identify, detect, protect
Guardians securing digital front for remote troops with precision
TLDR: The 3rd Infantry Division conducted the Army’s first long-range, fully remote cybersecurity operation at the division level while the 1st Armored Brigade Combat Team was at Fort Irwin, California. The remote
Microsoft’s Licensing: A Security Threat to the Nation
TLDR: Microsoft’s licensing practices pose a threat to national security, as they have a cozy relationship with China. Government agencies are locked into using Microsoft products, making them vulnerable to security breaches.