The $600 000 question

Issue 7 2022 Information Security, Security Services & Risk Management, Financial (Industry)


Usman Choudhary.

Cybercrime continues to be a persistent and pressing issue for small businesses. In fact, according to the National Cyber Security Alliance, nearly 60% of small businesses that experience a cyberattack shut their doors within six months.

Despite the rise in risk, many small businesses remain vulnerable to cyberattacks due to a lack of resources and – surprisingly – a lack of knowledge of the threat. Moreover, a recent survey uncovered that just 19% of companies possess cyber insurance, which can be devastating should bad actors circumvent your company’s defences.

Before we dive any further into the case for cyber insurance, let’s first discuss how cyber insurance works and who can benefit from a policy.

How does cyber insurance work?

Cyber insurance is a policy that helps an organisation pay for any financial losses incurred following a data breach or cyberattack. It also helps cover any costs related to the remediation process, such as paying for the investigation, crisis communication, legal services and customer refunds.

Who needs cyber insurance?

While all businesses can benefit from having cyber insurance, small businesses frequently lack the coverage, usually because of the cost, time involved in finding a provider, and lack of understanding of the importance of a cyber insurance policy.


The need for cyber insurance

It’s no surprise that bad actors are getting more cunning and creative when it comes to targeting businesses – and small businesses are usually the bullseye of their predatory plan.

Beyond the reputational risk involved, the cost of a cyberattack can be devastating. Today, data breaches can reach more than $600 000, while the average cost to investigate and recover from an attack is approximately $2,4 million.

With the constant and ever-increasing threat of potential cyberattacks, many companies are applying for cyber insurance, which generally covers a variety of attacks, including:

• Data breaches.

• Business email compromises.

• Cyber extortion demands.

• Malware infections.

• Ransomware.

• Network business interruption.

Not so fast…

Before applying for cyber insurance, you must first show that your business has implemented a long list of cybersecurity technologies and practices, such as multifactor authentication (MFA) and endpoint detection and response (EDR), to get coverage.

Multi-factor authentication: MFA is a security technology that combines two or more independent credentials: what the user knows, such as a password; what the user has, such as a security token; and what the user is, by using biometric verification methods to create a layered defence, making it more difficult for a bad actor to access a target, such as a physical location, computing device, network or database.

MFA is highly effective at thwarting bad actors. A study by Microsoft found MFA provides an added layer of security that can block up to 99,9% of attacks stemming from compromised accounts.

Endpoint detection and response: EDR uses endpoint data collection software installed on machines to constantly monitor, flag and respond to cyber threats like ransomware and malware. If suspicious activity is detected, the system is triggered. EDR can also automatically block malicious activity to temporarily isolate an infected endpoint from the rest of the network to stop malware from spreading.

Protecting your business, your employees and your customers is your responsibility. When you’re ready to protect your business from a potential cyberattack, be sure to do your research and choose a reputable partner to implement MFA and EDR technology. However, it’s important to remember that obtaining cyber insurance is not enough. You must constantly monitor your business, stay informed on the latest cyberattack trends, and train your employees on cybersecurity with a comprehensive security awareness training programme. Do your part to stay on top of potential risks and protect your employees, your customers and your business from bad actors.

Find out more at www.vipre.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa News & Events Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.

Read more...
New law enforcement request portal
News & Events Security Services & Risk Management
inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...