Insurers Use Claims Data to Recommend Cybersecurity Technologies

Businesses using a managed detection and response provider cut their median response time to a cyber incident by half, and saw a commensurate - and dramatic - reduction in the impact of each incident, according to an analysis of insurance claims data.
At least one cyber insurance firm is exploring offering discounts on policy premiums based on what kind of technology the organization has in its environment.
By adding the skilled expertise of cybersecurity professionals to major endpoint detection and response platforms, companies had fewer incidents and what incidents they did have were less serious, according to cyber insurance firm Coalition.
Based on the analysis, the company offers credits to cyber insurance premiums for its policyholders based on whether they have deployed MDR and which one, says Tiago Henriques, vice president of research for Coalition.
Unmanaged endpoint detection and response platforms do not merit the discount, he says.
The cyber insurance firm's findings are not surprising.
Because cybersecurity and incident-response experts deal with security events on a regular basis, managed detection and response services save their clients significant time, reducing the cost of incident response and saving the time of cybersecurity professionals, says Jeff Pollard, vice president and principal analyst with business intelligence firm Forrester Research.
The average customer tends to save 33 hours per incident to identify actual malicious activity, 16 hours to investigate and determine the severity, and 16 hours performing root cause analysis, according to Forrester survey data.
Collecting Data on Business Risks Managed detection and response platforms are not alone in being recommended by cyber insurance providers.
Last year, Coalition found that organizations using Google Workspace had only 43% of the financial transaction fraud claims rate as companies using Microsoft Office 365, while insurtech firm At-Bay saw that firms using Microsoft 365 had double the claims of Google Workspace.
Insecure email systems are a major source of insurance claims, with business email compromise accounting for 26% of Coalition's cyber claims and email in general accounting for 41% of At-Bay's claims, the firms stated.
Coalition plans to continue to crunch their numbers to determine what other technologies may lower claims rates, Coalition's Henriques says.
In its Cyber Threat Index 2024 published on Feb 21, the company also found that more than 10,000 businesses are running instances of Microsoft SQL Server 2000, an end-of-life product, which is reachable from the Internet.
Coalition will not insure companies with open ports for the Remote Desktop Protocol, because of the easy with which it can typically be compromised.
Scanning for the open port increased by 59% in 2023, the firm said.
The savings on policies could set cyber insurance firms on the path to recommend specific solutions to businesses based on which lead to fewer - and smaller - claims.
To some degree, that discussion is already occurring, says Coalition's Henriques.
The most secure technologies may not be worth the policy savings, says Forrester's Pollard.
While everything will eventually become a service, because the skills to operate and maintain technology are not widely distributed, whether they make sense for a specific business depends on the economics, he says.
In the end, businesses may have to accept higher premiums for their particular IT environment, or may not be able to get insurance at all.


This Cyber News was published on www.darkreading.com. Publication date: Thu, 22 Feb 2024 21:35:15 +0000


Cyber News related to Insurers Use Claims Data to Recommend Cybersecurity Technologies

How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
1 month ago Aws.amazon.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
Why CISOs Need to Make Cyber Insurers Their Partners - Organizations may perceive the lengthy and involved process, paired with rising premiums, as insurance companies taking advantage of them. Insurance companies are struggling to balance soaring loss ratios that were particularly rampant a couple years ...
10 months ago Darkreading.com
Takeaways from Cisco at InsureTech Connect 2023 - InsureTech Connect 2023, the premier conference for the insurance technology industry, brought together 9,000+ innovators, leaders, and solution providers to Las Vegas in early November to explore the latest trends, technologies, and disruptions in ...
11 months ago Feedpress.me
Insurers Use Claims Data to Recommend Cybersecurity Technologies - Businesses using a managed detection and response provider cut their median response time to a cyber incident by half, and saw a commensurate - and dramatic - reduction in the impact of each incident, according to an analysis of insurance claims ...
8 months ago Darkreading.com
Avoid high cyber insurance costs by improving Active Directory security - Insurance broker and risk advisor Marsh revealed that US cyber insurance premiums rose by an average of 11% in the first quarter of 2023, and Delinea reported that 67% of survey respondents said their cyber insurance costs increased between 50% and ...
8 months ago Bleepingcomputer.com
Fortinet Contributes to World Economic Forum's Strategic Cybersecurity Talent Framework - Shining a light on the cybersecurity workforce challenge, the World Economic Forum recently published its Strategic Cybersecurity Talent Framework, which is intended to serve as a reference for public and private decision-makers concerned by the ...
6 months ago Feeds.fortinet.com
Resecurity and ICS Technologies join forces to improve cybersecurity in Iraq - Resecurity and ICS Technologies IRAQ, a well-established ICT System Integration Company with HQ in Baghdad, Iraq, have joined forces to fortify cybersecurity, fraud prevention and risk intelligence measures nationwide. This strategic partnership is ...
11 months ago Helpnetsecurity.com
Cybersecurity Curriculum Development Tips for Schools - With the constant threat of cyber attacks, schools must prioritize the development of a robust cybersecurity curriculum to equip students with the necessary skills and knowledge. This article provides valuable insights and tips for schools aiming to ...
10 months ago Securityzap.com
Student Cybersecurity Clubs: Fostering Online Safety - Student cybersecurity clubs are playing a crucial role in promoting online safety among students. Student cybersecurity clubs play a vital role in this regard, as they provide a platform for students to learn about the latest threats, share best ...
10 months ago Securityzap.com
Cybersecurity Curriculum Development Tips - In this article, we will explore essential tips for developing a comprehensive and up-to-date cybersecurity curriculum. By staying abreast of the latest industry trends, educational program developers can ensure that their curriculum remains relevant ...
10 months ago Securityzap.com
Growing threats outpace cybersecurity workforce - The cybersecurity skills shortage threatens the well-being and even survival of numerous businesses as cybersecurity threats grow more numerous, sophisticated, and dangerous to the point that cybersecurity groups have vowed not to pay ransom demands. ...
9 months ago Legal.thomsonreuters.com
How to become a cybersecurity architect - Cybersecurity architects implement and maintain a comprehensive cybersecurity framework to protect their company's digital assets. The cybersecurity architect position is a fundamental role that all organizations need, said Lester Nichols, director ...
4 months ago Techtarget.com
The Importance of Cybersecurity Education in Schools - Cybersecurity education equips students with the knowledge and skills needed to protect themselves and others from cyber threats. Cybersecurity education can teach students about the impact of cyberbullying, how to prevent it, and how to respond ...
11 months ago Securityzap.com
Meet Your New Cybersecurity Auditor: Your Insurer - As businesses deal with the fallout of massive ransomware waves, from Lapsus$ to Cl0p/MOVEit, an unlikely new entity is joining the regulatory bodies to raise the bar for cybersecurity: the cyber insurer. Their coverage requirements and ...
11 months ago Darkreading.com
Digital Learning Tools for Cybersecurity Education - In the field of cybersecurity education, digital learning tools have become indispensable. This article explores various digital learning tools tailored specifically to cybersecurity education. These digital learning tools play a crucial role in ...
10 months ago Securityzap.com
Understanding the New SEC Rules for Disclosing Cybersecurity Incidents - The U.S. Securities and Exchange Commission recently announced its new rules for public companies regarding cybersecurity risk management, strategy, governance, and incident exposure. "Currently, many public companies provide cybersecurity disclosure ...
11 months ago Feeds.dzone.com
What the cybersecurity workforce can expect in 2024 - For cybersecurity professionals, 2023 was a mixed bag of opportunities and concerns. The good news is that the number of people in cybersecurity jobs has reached its highest number ever: 5.5 million, according to the 2023 ISC2 Global Workforce Study. ...
10 months ago Securityintelligence.com
Cybersecurity Training for Business Leaders - This article explores the significance of cybersecurity training for business leaders and its crucial role in establishing a secure and resilient business environment. By examining the key components of effective training programs and the ...
9 months ago Securityzap.com
Cyber Employment 2024: Sky-High Expectations Fail Businesses & Job Seekers - Well-publicized estimates of a massive shortfall in cybersecurity workers have resulted in high expectations among job seekers in the field, but the reality often falls flat, because of a mismatch between companies' requirements and job seekers' ...
10 months ago Darkreading.com
Gamification in Cybersecurity Education - Gamification has become increasingly prevalent in numerous domains, including cybersecurity education. Gamification presents a promising approach to meet this challenge, making cybersecurity education both effective and enjoyable. One way to ...
10 months ago Securityzap.com
Developing Cybersecurity Awareness Programs for Schools - Schools are increasingly becoming targets for cyberattacks, necessitating the development of robust cybersecurity awareness programs. Ultimately, a comprehensive cybersecurity awareness program is essential for schools to mitigate risks, enhance ...
10 months ago Securityzap.com
Law Firms are Raising the Bar on Cybersecurity - Corresponding with recent increases in threat actor activity in the legal industry, law firms are investing more time and attention in modernizing security operations. Both midsize and large law firms are increasingly engaging with cybersecurity ...
1 year ago Bluevoyant.com
Key cybersecurity skills gap statistics you should be aware of - As the sophistication and frequency of cyber threats continue to escalate, the demand for skilled cybersecurity professionals has never been bigger. The skills gap is not merely a statistical discrepancy; it represents a substantial vulnerability in ...
10 months ago Helpnetsecurity.com
How to Avoid Falling Below the Cybersecurity Poverty Line - The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy ...
1 year ago Csoonline.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)