What Insurers Need to Know About Next-Gen Cyber Threats
The decision to pay or reject ransom demands is a complicated mix of identifying the source, evaluating backup plans and remaining compliant.
Cyber intruders are using the experience of early ransomware efforts to design deeper, multi-layered attacks that combine holding data hostage with the possibility of intentional breaches.
Some cyber intrusions result in full-fledged data breaches, which trigger mandatory regulatory and legal responses.
Ransomware developers have begun selling their software to would-be peers, making it more difficult to identify the source by the characteristics of the attacking software.
Insureds seeking carrier or coverage or insurers seeking reinsurance face the same challenges: demonstrating security controls, training and concentration of risk.