SlideShare a Scribd company logo
December 8, 2014
A
data breach can be
crippling to a small
business.
The average cost of a corpo-
rate breach increased 15 percent
in the last year to $3.5 million,
according to the Ponemon Insti-
tute, a Michigan-based private
research group.
With large cyber breaches
continuing to make headlines
weekly, more companies are
considering cyber insurance
policies to protect against fi-
nancial fallout.
“Cyber insurance continues
to be the fastest growing type
of insurance today,” says Rick
Betterley, president of Bet-
terley Risk Consultants Inc., a
Sterling, Massachusetts-based
risk management consulting
firm that publishes an annual
cyber/ privacy insurance mar-
ket survey. Nationally, busi-
nesses are expected to spend
around $2 billion on cyber in-
surance premiums in 2014, up
from $1.2 billion last year, ac-
cording to Betterley.
Mitigating losses
The insurance is designed to
mitigate losses from a variety
of cyber incidents, including
data breaches, business inter-
ruption and network damage,
LI BUSINESS
Data breach insurance
NEWSDAY/ALEJANDRAVILLA
Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy — proactively
— with the help of Steven Browne of Insureatech Agency in New Hyde Park.
LIBUSINESSnewsday.comNEW
A
data breach can be crip-
pling to a small business.
The average cost of a
corporate breach increased 15
percent in the last year to $3.5
million, according to the
Ponemon Institute, a Michigan-
based private research group.
With large cyber breaches
continuing to make headlines
weekly, more companies are
considering cyber insurance
policies to protect against finan-
cial fallout.
“Cyber insurance continues
to be the fastest growing type
of insurance today,” says Rick
Betterley, president of Better-
ley Risk Consultants Inc., a
Sterling, Massachusetts-based
risk management consulting
firm that publishes an annual
cyber/ privacy insurance mar-
ket survey. Nationally, busi-
nesses are expected to spend
around $2 billion on cyber in-
surance premiums in 2014, up
from $1.2 billion last year, ac-
cording to Betterley.
Mitigating losses
The insurance is designed to
mitigate losses from a variety of
cyber incidents, including data
breaches, business interruption
and network damage, according
to the Department of Home-
land Security.
“The initial demand for this
product was driven by larger
corporations,” explains Robert
P. Hartwig, president of the In-
surance Information Institute, a
Manhattan-based industry
trade association. “It began to
movedownto mid-size corpora-
Browne, who works with about
six insurance carriers including
Travelers and Hartford.
Many businesses think it
won’t happen to them, or that
their general liability coverage
will protect them. But general li-
ability typically covers physical
loss or damage, not the data
side, he explains.
Cyber insurancecancover lia-
bility incurred by the insured,
including defense and settle-
ment costs, remediation and re-
sponse costs such as customer
notification and credit monitor-
ing, costs related to regulatory
fines and penalties and in some
cases credit card fines and pen-
alties from card issuers, accord-
ing to Betterley. It can also
cover loss of business income
ents putting language in con-
tracts asking if she had cyber in-
surance. “At some point what
I’m doing now proactively will
become a requirement from our
clients,” says D’Apuzzo, who
worked with Insureatech to se-
mond & Co. LLC, a benefits and
risk management advisory firm
in Uniondale. “Two years ago,
people weren’t even speaking
about this.”
Now about 15 percent of the
firm’s clients are purchasing
cyber policies, he says. “Compa-
nies have come to realize it’s
not a matter of if they’re going
to get breached, but when
they’re going to get breached.”
Risk assessment
Products vary, so work with a
broker to understand your risk
and coverage needs. Premiums
generally run $2,000 to $5,000 a
year depending on the industry
and company size, estimates
Browne.
As part of the process, insur-
SMALL
BUSINESS
Jamie Herzlich
Data breach insurance
NEWSDAY/ALEJANDRAVILLA
son
eri-
rab
orc-
ore,
hem
unts
nual
the
ain
to
in-
on-
esi-
re-
the
hich
has
s it
eti-
and
the
ll 13
. In
the
on.
em
s of
ave
nes.
ow
ing
hed
ent
ult-
ow
ED
Y
jherzlich@aol.com
LI BUSINESS
CYBER COST
Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy —
proactively — with the help of Steven Brown of Insureatech Agency in New Hyde Park.
Policies mitigate
company losses
incyberincidents
The average cost of
notifying victims of a
data breach — one of
the largest costs that
companies incur — is
$509,237.
Source: Ponemon Institute
A35
PRINTED COPY FOR PERSONAL READING ONLY.
NOT FOR DISTRIBUTION
according to the Department
of Homeland Security.
“The initial demand for this
product was driven by larger
corporations,” explains Robert
P. Hartwig, president of the In-
surance Information Institute,
a Manhattan-based industry
trade association. “It began to
move down to mid-size corpo-
rations, and eventually it will
make its way down to smaller
and smaller businesses.”
That’s what Steven Browne,
president of Insureatech Agency
in New Hyde Park, a broker
for cyber liability insurance, is
banking on.
Last year, he started Insure-
atech as a separate division of
Sachem Insurance Agency, be-
cause he saw breaches becom-
ing more prevalent in the news.
“We saw a big need for it,” says
Browne, who works with about
six insurance carriers includ-
ing Travelers and Hartford.
Many businesses think it won’t
happen to them, or that their gen-
eral liability coverage will protect
them. But general liability typi-
cally covers physical loss or dam-
age, not the data side, he explains.
Cyber insurance can cover
liability incurred by the in-
sured, including defense and
settlement costs, remedia-
tion and response costs such
as customer notification and
credit monitoring, costs relat-
ed to regulatory fines and pen-
alties and in some cases credit
card fines and penalties from
card issuers, according to Bet-
terley. It can also cover loss of
business income post-breach,
adds Browne.
These costs can add up.
Pam D’Apuzzo, president of
RR Health Strategies LLC, a
health care consulting firm in
Uniondale, recently took out
a cyber insurance policy. The
company provides consult-
ing to clients including private
health practices, hospitals and
teaching facilities, and routine-
ly reviews medical records for
compliance.
D’Apuzzo noticed more cli-
ents putting language in con-
tracts asking if she had cyber
insurance. “At some point what
I’m doing now proactively will
become a requirement from
our clients,” says D’Apuzzo,
who worked with Insureatech
to secure the policy. “I think
we’ll be ahead of the curve.”
Even though she takes neces-
sary security precautions when
dealing with sensitive data, she
wants to makes sure she’s pro-
tected. “This added layer of cy-
ber insurance is an extra safety
net for me,” says D’Apuzzo.
And as more breaches make
headlines, more smaller firms
will likely follow suit.
“Demand is picking up,”
says Marc Schein of Chernoff
Diamond & Co. LLC, a benefits
and risk management advi-
sory firm in Uniondale. “Two
years ago, people weren’t even
speaking about this.”
Now about 15 percent of
the firm’s clients are purchas-
ing cyber policies, he says.
“Companies have come to
realize it’s not a matter of if
they’re going to get breached,
but when they’re going to get
breached.”
Risk assessment
Products vary, so work with
a broker to understand your
risk and coverage needs. Pre-
miums generally run $2,000 to
$5,000 a year depending on the
industry and company size, es-
timates Browne.
As part of the process, insur-
ers will do a risk assessment
and make recommendations,
Hartwig says. “It’s not simply
pure insurance,” he notes. “It in-
volves elements of prevention.”
Browne partners with out-
side cyber-security consul-
tants to perform risk assess-
ments. “We want to make sure
certain systems are in place
and they’re protected,” he says,
adding insurers after the fact
may not cover a breach if the
insured was lacking in some of
these protections.
(#84017) Copyright 2014 Newsday LLC. Reprinted with permission. To subscribe to Newsday, please call 1-800-Newsday or visit us online at Newsday.com.
For information about reprints and permissions from Newsday, visit PARS International Corp. at www.newsdayreprints.com.
newsday.comNEWSDAY,MONDAY,DECEMBER8,2014
ulting
nnual
mar-
busi-
pend
er in-
4, up
r, ac-
ed to
ety of
data
ption
rding
ome-
r this
arger
obert
he In-
ute, a
ustry
an to
pora-
will
maller
owne,
Agen-
roker
ce, is
ureat-
of Sa-
, be-
com-
news.
” says
Browne, who works with about
six insurance carriers including
Travelers and Hartford.
Many businesses think it
won’t happen to them, or that
their general liability coverage
will protect them. But general li-
ability typically covers physical
loss or damage, not the data
side, he explains.
Cyber insurancecancover lia-
bility incurred by the insured,
including defense and settle-
ment costs, remediation and re-
sponse costs such as customer
notification and credit monitor-
ing, costs related to regulatory
fines and penalties and in some
cases credit card fines and pen-
alties from card issuers, accord-
ing to Betterley. It can also
cover loss of business income
post-breach, adds Browne.
These costs can add up.
Pam D’Apuzzo, president of
RR Health Strategies LLC, a
health care consulting firm in
Uniondale, recently took out a
cyber insurance policy. The
company provides consulting
to clients including private
health practices, hospitals and
teaching facilities, and routine-
ly reviews medical records for
compliance.
D’Apuzzo noticed more cli-
ents putting language in con-
tracts asking if she had cyber in-
surance. “At some point what
I’m doing now proactively will
become a requirement from our
clients,” says D’Apuzzo, who
worked with Insureatech to se-
cure the policy. “I think we’ll be
ahead of the curve.”
Even though she takes neces-
sary security precautions when
dealing with sensitive data, she
wants to makes sure she’s pro-
tected. “This added layer of
cyber insurance is an extra safe-
ty net for me,” says D’Apuzzo.
And as more breaches make
headlines, more smaller firms
will likely follow suit.
“Demand is picking up,” says
Marc Schein of Chernoff Dia-
mond & Co. LLC, a benefits and
risk management advisory firm
in Uniondale. “Two years ago,
people weren’t even speaking
about this.”
Now about 15 percent of the
firm’s clients are purchasing
cyber policies, he says. “Compa-
nies have come to realize it’s
not a matter of if they’re going
to get breached, but when
they’re going to get breached.”
Risk assessment
Products vary, so work with a
broker to understand your risk
and coverage needs. Premiums
generally run $2,000 to $5,000 a
year depending on the industry
and company size, estimates
Browne.
As part of the process, insur-
ers will do a risk assessment
and make recommendations,
Hartwig says. “It’s not simply
pure insurance,” he notes. “It in-
volves elements of prevention.”
Browne partners with outside
cyber-security consultants to
perform risk assessments. “We
want to make sure certain sys-
temsareinplaceandthey’repro-
tected,” he says, adding insurers
after the fact may not cover a
breach if the insured was lack-
ing in some of these protections.
NE
CYBER COST
Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy —
proactively — with the help of Steven Brown of Insureatech Agency in New Hyde Park.
The average cost of
notifying victims of a
data breach — one of
the largest costs that
companies incur — is
$509,237.
Source: Ponemon Institute
PRINTED COPY FOR PERSONAL READING ONLY.
NOT FOR DISTRIBUTION

More Related Content

What's hot

Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
- Mark - Fullbright
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
Richard Brzakala
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
EMC
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
minorifh
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to knowFitCEO, Inc. (FCI)
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
Meg Weber
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
Accenture Insurance
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference
David Sweigert
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousEthan S. Burger
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
Accenture Insurance
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
balejandre
 

What's hot (18)

Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
 
Technology Trends in Insurance
Technology Trends in InsuranceTechnology Trends in Insurance
Technology Trends in Insurance
 
Cyber Insurance - What you need to know
Cyber Insurance - What you need to knowCyber Insurance - What you need to know
Cyber Insurance - What you need to know
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
20140317eyinformationsupp
20140317eyinformationsupp20140317eyinformationsupp
20140317eyinformationsupp
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference2017 FS-ISAC Security Conference
2017 FS-ISAC Security Conference
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is HazardousComplacency in the Face of Evolving Cybersecurity Norms is Hazardous
Complacency in the Face of Evolving Cybersecurity Norms is Hazardous
 
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance SectorThe Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
The Digital Multiplier: Five Steps To Digital Success In The Insurance Sector
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 

Viewers also liked

87con audio
87con audio87con audio
840 - Yad Vashem
840 - Yad Vashem840 - Yad Vashem
840 - Yad Vashem
mireille 30100
 
8.3.4ppg.ipg.maria.melendez.hernandez
8.3.4ppg.ipg.maria.melendez.hernandez8.3.4ppg.ipg.maria.melendez.hernandez
8.3.4ppg.ipg.maria.melendez.hernandezmarmelher
 
8.6 Resolución del Caso.
8.6 Resolución del Caso.8.6 Resolución del Caso.
8.6 Resolución del Caso.
Brox Technology
 
87 pdfsam crossman - texto y atlas de neuroanatomia
87 pdfsam crossman - texto y atlas de neuroanatomia87 pdfsam crossman - texto y atlas de neuroanatomia
87 pdfsam crossman - texto y atlas de neuroanatomiaCésar Ibáñez
 
860 dsp zero_span_appnote
860 dsp zero_span_appnote860 dsp zero_span_appnote
860 dsp zero_span_appnotetrilithicweb
 
84th Portuguese International Amateur Championship Men 2014
84th Portuguese International Amateur Championship Men 201484th Portuguese International Amateur Championship Men 2014
84th Portuguese International Amateur Championship Men 2014
.
 
860 dspi firmware_upgrade_instructions_app_note
860 dspi firmware_upgrade_instructions_app_note860 dspi firmware_upgrade_instructions_app_note
860 dspi firmware_upgrade_instructions_app_notetrilithicweb
 
тест 8 р анги хөгжим
тест 8 р анги хөгжимтест 8 р анги хөгжим
тест 8 р анги хөгжимAmarsanaa Ochir
 
87 paper battery
87 paper battery87 paper battery
87 paper battery
muni kanth
 
PEDIDO DE PROVIDÊNCIA 832
PEDIDO DE PROVIDÊNCIA 832PEDIDO DE PROVIDÊNCIA 832
PEDIDO DE PROVIDÊNCIA 832vereadoreduardo
 
855 sleepy
855 sleepy855 sleepy
855 sleepy
mireille 30100
 
1Q11 Results Conference Call
1Q11 Results Conference Call1Q11 Results Conference Call
1Q11 Results Conference Call
Kianne Paganini
 
صـ 85 ، 86
صـ 85 ، 86صـ 85 ، 86
صـ 85 ، 86smfo
 

Viewers also liked (20)

86128 quiero volver-a_confiar
86128 quiero volver-a_confiar86128 quiero volver-a_confiar
86128 quiero volver-a_confiar
 
87con audio
87con audio87con audio
87con audio
 
haloxano
haloxanohaloxano
haloxano
 
840 - Yad Vashem
840 - Yad Vashem840 - Yad Vashem
840 - Yad Vashem
 
8.3.4ppg.ipg.maria.melendez.hernandez
8.3.4ppg.ipg.maria.melendez.hernandez8.3.4ppg.ipg.maria.melendez.hernandez
8.3.4ppg.ipg.maria.melendez.hernandez
 
8.6 Resolución del Caso.
8.6 Resolución del Caso.8.6 Resolución del Caso.
8.6 Resolución del Caso.
 
87 pdfsam crossman - texto y atlas de neuroanatomia
87 pdfsam crossman - texto y atlas de neuroanatomia87 pdfsam crossman - texto y atlas de neuroanatomia
87 pdfsam crossman - texto y atlas de neuroanatomia
 
860 dsp zero_span_appnote
860 dsp zero_span_appnote860 dsp zero_span_appnote
860 dsp zero_span_appnote
 
84th Portuguese International Amateur Championship Men 2014
84th Portuguese International Amateur Championship Men 201484th Portuguese International Amateur Championship Men 2014
84th Portuguese International Amateur Championship Men 2014
 
860 dspi firmware_upgrade_instructions_app_note
860 dspi firmware_upgrade_instructions_app_note860 dspi firmware_upgrade_instructions_app_note
860 dspi firmware_upgrade_instructions_app_note
 
ふくあず#8
ふくあず#8ふくあず#8
ふくあず#8
 
85 0076-e eco-2 plus-installation insert_web
85 0076-e eco-2 plus-installation insert_web85 0076-e eco-2 plus-installation insert_web
85 0076-e eco-2 plus-installation insert_web
 
тест 8 р анги хөгжим
тест 8 р анги хөгжимтест 8 р анги хөгжим
тест 8 р анги хөгжим
 
87 paper battery
87 paper battery87 paper battery
87 paper battery
 
PEDIDO DE PROVIDÊNCIA 832
PEDIDO DE PROVIDÊNCIA 832PEDIDO DE PROVIDÊNCIA 832
PEDIDO DE PROVIDÊNCIA 832
 
85641sdfghjkiloñ
85641sdfghjkiloñ85641sdfghjkiloñ
85641sdfghjkiloñ
 
8593960_StrengthenRotary
8593960_StrengthenRotary8593960_StrengthenRotary
8593960_StrengthenRotary
 
855 sleepy
855 sleepy855 sleepy
855 sleepy
 
1Q11 Results Conference Call
1Q11 Results Conference Call1Q11 Results Conference Call
1Q11 Results Conference Call
 
صـ 85 ، 86
صـ 85 ، 86صـ 85 ، 86
صـ 85 ، 86
 

Similar to 84017

Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
sarahb171
 
Health and Safety Proposal
Health and Safety ProposalHealth and Safety Proposal
Health and Safety ProposalGreta McClain
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
- Mark - Fullbright
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
NationalUnderwriter
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
AlleneMcclendon878
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalNicholas Cramer
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
Christopher Rieser
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
Grant Thornton LLP
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
Michael C. Keeling, Esq.
 
Employee Benefits & Business Risk
Employee Benefits & Business RiskEmployee Benefits & Business Risk
Employee Benefits & Business Risk
The Rigg Darlington Group, Inc.
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group, Inc.
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
Protected Harbor
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
julchap
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
Elizabeth Dimit
 

Similar to 84017 (20)

Data Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector PlanData Breach Insurance - Optometric Protector Plan
Data Breach Insurance - Optometric Protector Plan
 
Insurance Fraud Whitepaper
Insurance Fraud WhitepaperInsurance Fraud Whitepaper
Insurance Fraud Whitepaper
 
Health and Safety Proposal
Health and Safety ProposalHealth and Safety Proposal
Health and Safety Proposal
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an AuditCyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
Cyber Security and Insurance Coverage Protection: The Perfect Time for an Audit
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 
All clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equalAll clear id_whitepaper__not_all_breaches_are_created_equal
All clear id_whitepaper__not_all_breaches_are_created_equal
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1Cloud security law cyber insurance issues phx 2015 06 19 v1
Cloud security law cyber insurance issues phx 2015 06 19 v1
 
Employee Benefits & Business Risk
Employee Benefits & Business RiskEmployee Benefits & Business Risk
Employee Benefits & Business Risk
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
The Rigg Darlington Group B2B Newsletter Vol. 44, Issue 4
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
 
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great CollaboratorsTo Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
To Be Great Enterprise Risk Managers, CISOs Need to Be Great Collaborators
 

84017

  • 1. December 8, 2014 A data breach can be crippling to a small business. The average cost of a corpo- rate breach increased 15 percent in the last year to $3.5 million, according to the Ponemon Insti- tute, a Michigan-based private research group. With large cyber breaches continuing to make headlines weekly, more companies are considering cyber insurance policies to protect against fi- nancial fallout. “Cyber insurance continues to be the fastest growing type of insurance today,” says Rick Betterley, president of Bet- terley Risk Consultants Inc., a Sterling, Massachusetts-based risk management consulting firm that publishes an annual cyber/ privacy insurance mar- ket survey. Nationally, busi- nesses are expected to spend around $2 billion on cyber in- surance premiums in 2014, up from $1.2 billion last year, ac- cording to Betterley. Mitigating losses The insurance is designed to mitigate losses from a variety of cyber incidents, including data breaches, business inter- ruption and network damage, LI BUSINESS Data breach insurance NEWSDAY/ALEJANDRAVILLA Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy — proactively — with the help of Steven Browne of Insureatech Agency in New Hyde Park. LIBUSINESSnewsday.comNEW A data breach can be crip- pling to a small business. The average cost of a corporate breach increased 15 percent in the last year to $3.5 million, according to the Ponemon Institute, a Michigan- based private research group. With large cyber breaches continuing to make headlines weekly, more companies are considering cyber insurance policies to protect against finan- cial fallout. “Cyber insurance continues to be the fastest growing type of insurance today,” says Rick Betterley, president of Better- ley Risk Consultants Inc., a Sterling, Massachusetts-based risk management consulting firm that publishes an annual cyber/ privacy insurance mar- ket survey. Nationally, busi- nesses are expected to spend around $2 billion on cyber in- surance premiums in 2014, up from $1.2 billion last year, ac- cording to Betterley. Mitigating losses The insurance is designed to mitigate losses from a variety of cyber incidents, including data breaches, business interruption and network damage, according to the Department of Home- land Security. “The initial demand for this product was driven by larger corporations,” explains Robert P. Hartwig, president of the In- surance Information Institute, a Manhattan-based industry trade association. “It began to movedownto mid-size corpora- Browne, who works with about six insurance carriers including Travelers and Hartford. Many businesses think it won’t happen to them, or that their general liability coverage will protect them. But general li- ability typically covers physical loss or damage, not the data side, he explains. Cyber insurancecancover lia- bility incurred by the insured, including defense and settle- ment costs, remediation and re- sponse costs such as customer notification and credit monitor- ing, costs related to regulatory fines and penalties and in some cases credit card fines and pen- alties from card issuers, accord- ing to Betterley. It can also cover loss of business income ents putting language in con- tracts asking if she had cyber in- surance. “At some point what I’m doing now proactively will become a requirement from our clients,” says D’Apuzzo, who worked with Insureatech to se- mond & Co. LLC, a benefits and risk management advisory firm in Uniondale. “Two years ago, people weren’t even speaking about this.” Now about 15 percent of the firm’s clients are purchasing cyber policies, he says. “Compa- nies have come to realize it’s not a matter of if they’re going to get breached, but when they’re going to get breached.” Risk assessment Products vary, so work with a broker to understand your risk and coverage needs. Premiums generally run $2,000 to $5,000 a year depending on the industry and company size, estimates Browne. As part of the process, insur- SMALL BUSINESS Jamie Herzlich Data breach insurance NEWSDAY/ALEJANDRAVILLA son eri- rab orc- ore, hem unts nual the ain to in- on- esi- re- the hich has s it eti- and the ll 13 . In the on. em s of ave nes. ow ing hed ent ult- ow ED Y jherzlich@aol.com LI BUSINESS CYBER COST Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy — proactively — with the help of Steven Brown of Insureatech Agency in New Hyde Park. Policies mitigate company losses incyberincidents The average cost of notifying victims of a data breach — one of the largest costs that companies incur — is $509,237. Source: Ponemon Institute A35 PRINTED COPY FOR PERSONAL READING ONLY. NOT FOR DISTRIBUTION
  • 2. according to the Department of Homeland Security. “The initial demand for this product was driven by larger corporations,” explains Robert P. Hartwig, president of the In- surance Information Institute, a Manhattan-based industry trade association. “It began to move down to mid-size corpo- rations, and eventually it will make its way down to smaller and smaller businesses.” That’s what Steven Browne, president of Insureatech Agency in New Hyde Park, a broker for cyber liability insurance, is banking on. Last year, he started Insure- atech as a separate division of Sachem Insurance Agency, be- cause he saw breaches becom- ing more prevalent in the news. “We saw a big need for it,” says Browne, who works with about six insurance carriers includ- ing Travelers and Hartford. Many businesses think it won’t happen to them, or that their gen- eral liability coverage will protect them. But general liability typi- cally covers physical loss or dam- age, not the data side, he explains. Cyber insurance can cover liability incurred by the in- sured, including defense and settlement costs, remedia- tion and response costs such as customer notification and credit monitoring, costs relat- ed to regulatory fines and pen- alties and in some cases credit card fines and penalties from card issuers, according to Bet- terley. It can also cover loss of business income post-breach, adds Browne. These costs can add up. Pam D’Apuzzo, president of RR Health Strategies LLC, a health care consulting firm in Uniondale, recently took out a cyber insurance policy. The company provides consult- ing to clients including private health practices, hospitals and teaching facilities, and routine- ly reviews medical records for compliance. D’Apuzzo noticed more cli- ents putting language in con- tracts asking if she had cyber insurance. “At some point what I’m doing now proactively will become a requirement from our clients,” says D’Apuzzo, who worked with Insureatech to secure the policy. “I think we’ll be ahead of the curve.” Even though she takes neces- sary security precautions when dealing with sensitive data, she wants to makes sure she’s pro- tected. “This added layer of cy- ber insurance is an extra safety net for me,” says D’Apuzzo. And as more breaches make headlines, more smaller firms will likely follow suit. “Demand is picking up,” says Marc Schein of Chernoff Diamond & Co. LLC, a benefits and risk management advi- sory firm in Uniondale. “Two years ago, people weren’t even speaking about this.” Now about 15 percent of the firm’s clients are purchas- ing cyber policies, he says. “Companies have come to realize it’s not a matter of if they’re going to get breached, but when they’re going to get breached.” Risk assessment Products vary, so work with a broker to understand your risk and coverage needs. Pre- miums generally run $2,000 to $5,000 a year depending on the industry and company size, es- timates Browne. As part of the process, insur- ers will do a risk assessment and make recommendations, Hartwig says. “It’s not simply pure insurance,” he notes. “It in- volves elements of prevention.” Browne partners with out- side cyber-security consul- tants to perform risk assess- ments. “We want to make sure certain systems are in place and they’re protected,” he says, adding insurers after the fact may not cover a breach if the insured was lacking in some of these protections. (#84017) Copyright 2014 Newsday LLC. Reprinted with permission. To subscribe to Newsday, please call 1-800-Newsday or visit us online at Newsday.com. For information about reprints and permissions from Newsday, visit PARS International Corp. at www.newsdayreprints.com. newsday.comNEWSDAY,MONDAY,DECEMBER8,2014 ulting nnual mar- busi- pend er in- 4, up r, ac- ed to ety of data ption rding ome- r this arger obert he In- ute, a ustry an to pora- will maller owne, Agen- roker ce, is ureat- of Sa- , be- com- news. ” says Browne, who works with about six insurance carriers including Travelers and Hartford. Many businesses think it won’t happen to them, or that their general liability coverage will protect them. But general li- ability typically covers physical loss or damage, not the data side, he explains. Cyber insurancecancover lia- bility incurred by the insured, including defense and settle- ment costs, remediation and re- sponse costs such as customer notification and credit monitor- ing, costs related to regulatory fines and penalties and in some cases credit card fines and pen- alties from card issuers, accord- ing to Betterley. It can also cover loss of business income post-breach, adds Browne. These costs can add up. Pam D’Apuzzo, president of RR Health Strategies LLC, a health care consulting firm in Uniondale, recently took out a cyber insurance policy. The company provides consulting to clients including private health practices, hospitals and teaching facilities, and routine- ly reviews medical records for compliance. D’Apuzzo noticed more cli- ents putting language in con- tracts asking if she had cyber in- surance. “At some point what I’m doing now proactively will become a requirement from our clients,” says D’Apuzzo, who worked with Insureatech to se- cure the policy. “I think we’ll be ahead of the curve.” Even though she takes neces- sary security precautions when dealing with sensitive data, she wants to makes sure she’s pro- tected. “This added layer of cyber insurance is an extra safe- ty net for me,” says D’Apuzzo. And as more breaches make headlines, more smaller firms will likely follow suit. “Demand is picking up,” says Marc Schein of Chernoff Dia- mond & Co. LLC, a benefits and risk management advisory firm in Uniondale. “Two years ago, people weren’t even speaking about this.” Now about 15 percent of the firm’s clients are purchasing cyber policies, he says. “Compa- nies have come to realize it’s not a matter of if they’re going to get breached, but when they’re going to get breached.” Risk assessment Products vary, so work with a broker to understand your risk and coverage needs. Premiums generally run $2,000 to $5,000 a year depending on the industry and company size, estimates Browne. As part of the process, insur- ers will do a risk assessment and make recommendations, Hartwig says. “It’s not simply pure insurance,” he notes. “It in- volves elements of prevention.” Browne partners with outside cyber-security consultants to perform risk assessments. “We want to make sure certain sys- temsareinplaceandthey’repro- tected,” he says, adding insurers after the fact may not cover a breach if the insured was lack- ing in some of these protections. NE CYBER COST Pam D’Apuzzo of RR Health Strategies in Uniondale says she took out a cyber insurance policy — proactively — with the help of Steven Brown of Insureatech Agency in New Hyde Park. The average cost of notifying victims of a data breach — one of the largest costs that companies incur — is $509,237. Source: Ponemon Institute PRINTED COPY FOR PERSONAL READING ONLY. NOT FOR DISTRIBUTION