Some IT Pro’s Confused About Their Cyber Insurance: InformationWeek Survey

“12% (of 180 IT/cybersecurity professionals surveyed in June) had no idea whether ransomware is covered at all” in their cyber insurance policies.” About 28% of the respondents said their company had a stand-alone cybersecurity policy, lower than some estimates but close to a recent survey from Forrester (here). Most respondents who have a cyber insurance … Read more

Gap Opening Between D&O and Cyber Insurance

“’There’s been a hole that’s opening up between cyber and D&O policies, and this will widen the gap and require creative work by brokers to close, (Arturo Perez-Reyes, senior vice president and cyber strategist at San Francisco-based Newfront Insurance) said.” The causes include the recent SEC cyber regulations, about which we’ve written extensively. The required … Read more

Cyber Insurers Doing Well, Cyber Reinsurers Not So Much: S&P

Consistent with other recent reports, S&P Global Ratings finds global cyber insurance premiums surging, about $12 billion last year and headed to almost twice that by 2025. At the same time, increases in premium rates have moderated. The cybersecurity market has “returned to profitability,” accord to S&P. The news is less positive concerning reinsurers, which … Read more

Cyber Insurance May Cost More this Year, But at Least it Takes Longer to Get: Delinea

Our headline is a bit sarcastic, but it captures the findings of a survey covering more than 300 enterprises by Delinea, a provider of Privileged Access Management (PAM) solutions. The report provides insights on cyber insurance cost and time required to get a policy. The survey reports that almost 80% of companies saw their cyber … Read more

Does Your Cyber Insurance Cover Risk from Pixels & Biometrics?

It should but may not, according to this report. There’s legal risk from pixels and biometrics. Pixels track users’ online activities and are the source of growing litigation, including large class actions against Meta. Biometrics support useful security technologies, but often require written consent from users, who may also need to be informed about the … Read more

×