The $600 000 question

Issue 7 2022 Information Security, Security Services & Risk Management, Financial (Industry)


Usman Choudhary.

Cybercrime continues to be a persistent and pressing issue for small businesses. In fact, according to the National Cyber Security Alliance, nearly 60% of small businesses that experience a cyberattack shut their doors within six months.

Despite the rise in risk, many small businesses remain vulnerable to cyberattacks due to a lack of resources and – surprisingly – a lack of knowledge of the threat. Moreover, a recent survey uncovered that just 19% of companies possess cyber insurance, which can be devastating should bad actors circumvent your company’s defences.

Before we dive any further into the case for cyber insurance, let’s first discuss how cyber insurance works and who can benefit from a policy.

How does cyber insurance work?

Cyber insurance is a policy that helps an organisation pay for any financial losses incurred following a data breach or cyberattack. It also helps cover any costs related to the remediation process, such as paying for the investigation, crisis communication, legal services and customer refunds.

Who needs cyber insurance?

While all businesses can benefit from having cyber insurance, small businesses frequently lack the coverage, usually because of the cost, time involved in finding a provider, and lack of understanding of the importance of a cyber insurance policy.


The need for cyber insurance

It’s no surprise that bad actors are getting more cunning and creative when it comes to targeting businesses – and small businesses are usually the bullseye of their predatory plan.

Beyond the reputational risk involved, the cost of a cyberattack can be devastating. Today, data breaches can reach more than $600 000, while the average cost to investigate and recover from an attack is approximately $2,4 million.

With the constant and ever-increasing threat of potential cyberattacks, many companies are applying for cyber insurance, which generally covers a variety of attacks, including:

• Data breaches.

• Business email compromises.

• Cyber extortion demands.

• Malware infections.

• Ransomware.

• Network business interruption.

Not so fast…

Before applying for cyber insurance, you must first show that your business has implemented a long list of cybersecurity technologies and practices, such as multifactor authentication (MFA) and endpoint detection and response (EDR), to get coverage.

Multi-factor authentication: MFA is a security technology that combines two or more independent credentials: what the user knows, such as a password; what the user has, such as a security token; and what the user is, by using biometric verification methods to create a layered defence, making it more difficult for a bad actor to access a target, such as a physical location, computing device, network or database.

MFA is highly effective at thwarting bad actors. A study by Microsoft found MFA provides an added layer of security that can block up to 99,9% of attacks stemming from compromised accounts.

Endpoint detection and response: EDR uses endpoint data collection software installed on machines to constantly monitor, flag and respond to cyber threats like ransomware and malware. If suspicious activity is detected, the system is triggered. EDR can also automatically block malicious activity to temporarily isolate an infected endpoint from the rest of the network to stop malware from spreading.

Protecting your business, your employees and your customers is your responsibility. When you’re ready to protect your business from a potential cyberattack, be sure to do your research and choose a reputable partner to implement MFA and EDR technology. However, it’s important to remember that obtaining cyber insurance is not enough. You must constantly monitor your business, stay informed on the latest cyberattack trends, and train your employees on cybersecurity with a comprehensive security awareness training programme. Do your part to stay on top of potential risks and protect your employees, your customers and your business from bad actors.

Find out more at www.vipre.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Proactive strategies against payment fraud
Financial (Industry) Security Services & Risk Management
Amid a spate of high-profile payment fraud cases in South Africa, the need for robust fraud payment prevention measures has never been more apparent, says Ryan Mer, CEO of eftsure Africa.

Read more...
How to prevent and survive fires
Fire & Safety Security Services & Risk Management
Since its launch in August 2023, Fidelity SecureFire, a division of the Fidelity Services Group, has been making significant strides in revolutionising fire response services in South Africa.

Read more...
A long career in mining security
Technews Publishing Editor's Choice Security Services & Risk Management Mining (Industry)
Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.

Read more...
Risk management: There's an app for that
Editor's Choice News & Events Security Services & Risk Management
Zulu Consulting has streamlined the corporate risk management process with the launch of Risk-IO, a web-based app designed to consolidate and guide risk managers through the process, monitoring progress as one proceeds.

Read more...