Insurers Staying Secure with Cyber Security Technology
Shawn O'Rourke | August 17, 2015
How secure am I? How secure do I need to be? These are questions that have occupied the minds of CIOs, CSOs and CTOs for many years. However, recent high-profile security breaches have prompted these questions to be contemplated beyond the conference room and into the boardroom.
CEO’s and board members are now asking: How secure are we? How secure do we need to be? And with good reason. The year 2014 saw further reaching and more sophisticated exploitations on large and small companies alike.
According to the 2015 Internet Security Threat Report from Symantec, there were 317,000,000 new pieces of malware created in 2014. Ransom-ware attacks grew by an astonishing 4,000 percent. In these attacks the victim's files are encrypted and held hostage for a ransom. Ransoms are normally paid in bit-coins, a decentralized virtual Internet currency, and can amount to $250 or more per locked file.
To further complicate matters, companies are only as secure as their business partners. A recent BitSight Technologies study reported one-third of U.S. retailers who experienced a data breach within the past year were compromised through a partner relationship.
Insurance companies are certainly not immune. Even those companies that do not transact business online are finding their security postures weaker today than they were just a year ago. Two emerging factors play a significant role in reassessing an insurance company’s security.
First, there is a stark realization that it is not possible to protect against every cyber-criminal or cyber-attack. As hard as companies have tried, a determined, sophisticated cyber-criminal will eventually breach their defenses. Therefore, insurance companies must invest equal focus and emphasis on knowing when a cyber-criminal gets in and limiting the negative impact they may cause.
Second, Personally Identifiable Information (PII) and Personal Health Information (PHI) have eclipsed credit card numbers in criminal value. PII and PHI can yield as much as 10 times the value of a credit card number when used effectively by a cyber-criminal.
In the past, companies have primarily defended against hackers, individuals or small groups that have either malicious or criminal intent. Today, insurance companies not only need to defend against hackers, but according to the Department of Homeland Security, they must also prepare a cyber-defense strategy against foreign governments, terrorists, industrial spies, organized crime, and hacktivists. These groups’ motives range from low-level nuisance web page defacements, to direct financial and trade secret theft, all the way to espionage and serious regional or national disruption.
A company becomes the victim of a cyber-attack for three primary reasons:
- Because of what they have: Insurance companies are a rich source of PII, PHI, as well as credit card transactions, making them a prime target for cyber-criminals.
- Because of who they are or what they do: Because of a public industry position, or the role it plays, the insurance industry may make individual insurance companies a cyber-target. Likewise, an individual insurance company may be involved in litigation, or other high-profile event, making it a prime target for cyber-criminals.
- Because of where they are: Cyber-crime may be a crime of opportunity. Insurance companies transact business on the Internet, store data in the cloud, and send external email containing PII and PHI. Any of these activities may be visible to cyber-criminals, making the company a target.
A successful cyber-attack on an insurance company can impact that company in many ways including:
- Disruption to insurance operations, resulting in lost productivity.
- Financial loss from recovery costs, including credit reporting, reputation restoration, or litigation.
- Data loss resulting in disruption to operations or impact to customer service.
- Regulatory investigations, resulting in additional compliance reporting or fines.
- Reputational damage to the brand, ultimately resulting in lost revenue.
So what should an insurer do today to protect itself from cyber-criminals? While the ultimate answer is different for each company, I can recommend three best-practices:
- First, insurance companies must recognize cyber-security is not just an IT issue. It is an enterprise risk. It must be understood and managed corporately, just as any other risk that has the capability to significantly and negatively impact company results.
- Second, insurers need to appropriately invest in a comprehensive security program that protects the company not only with technology, but from social engineering targeted at the company’s employees. The financial services industry, in aggregate, invests approximately 12 percent of its IT spend toward security. The insurance sector invests approximately seven percent. Because of the shift in value from credit card to PII, that gap in investment will need to close.
- Finally, insurance companies need to be prepared with a response when a cyber-attack occurs. In addition to response plans and capabilities, carriers need to ensure they have cyber-defense insurance with coverages and capabilities matched to company needs. The right capabilities and resources executed as a front-line response to a cyber-attack can significantly mitigate longer-term negative impacts.
(Shawn O'Rourke is CTO with Farmington Hills, Mich.-based Amerisure Mutual Insurance Company. Amerisure and its affiliates target mid-sized commercial enterprises in manufacturing, construction and healthcare through strategically located core service centers across the U.S. For more information, visit amerisure.com.
- What to Expect from a Digital Experience Platform Implementation
- ITA Pro Magazine September Edition is Now Available
- It's National IT Professionals Day
- Save the Date for ITA-LIVE 2019
- OneShield Software and UrbanStat Work Together to Improve Real-Time Analytics and Risk Decision-Making
- ITA LIVE 2019 - SAVE THE DATE!
- Insurance Technology Association Announces New Editor-in-Chief
- August 2018 Edition ITA Pro Magazine is Now Available
- Enterprise Architecture in an Agile World
- Top 10 Tips for Securing Your Mobile Devices and Sensitive Client Data
- Industry Insight: 4 Global Insurance Trends in Digital, Data, Content Services and Security
- Diving Deeper into Prioritizing Your Strategic Digital investments
- Why Content Rules
- How Mass Personalization Will Open the Small Business Benefits Market
- At Year End 2017, Will Your Organization Be Protected from Cyber Risks?
- Do Insurance Bots Dream of Mitigating Risk?
- Conditioned to Respond
- Managing & Mobilizing Insurance Data in a Connected World
- Race to the Finish Line
- New Tools, New Opportunities in Claims
- ITA LIVE: Reaching Insurance Industry Crossroads
- Advice to Insurance IT Leaders: Keep Your Eye on the Ball
- New Date, Venue for ITA LIVE 2017
- Guidewire Makes Major Push to Small and Midtier Market by Acquiring ISCS
- Insurance Disruption is Happening Right Now
- Insurity Adds Strategic Investment Partner, General Atlantic
- Beyond Transformation: The Convergence of Finance, Risk, and Actuarial Functions
- The Rapid Evolution of Consumer Protection Regulation
- Talent Hunt: Finding, Attracting, Retaining Top People
- Insurers Flexing Their Distribution Models
- Technology Driving Disruption in Insurance
- Fear of ‘Next Bubble’ Challenges Life, Annuity Carriers
- Technology Allows Commercial Lines Insurers to Stand Out
- Single Sign-on Viewed as Biggest Tech Challenge for Agencies
- ISCS Observes 20th Anniversary; Scurto Predicts Major Changes Ahead
- Policyholders and Their First Impressions
- Progressive Making Progress on the UBI Front
- High and Dry: Insurers Search for Disaster Recovery Plans
- Insurers Sign The (Un)Dotted Line
- Reflections of a Retired Insurance CIO
- Mobile Device Management Just One Answer to BYOD Issue
- Lessons from GEICO and Progressive on Winning the Critical Buying Stage
- You Are a Target for a Cyber Attack
- Web-based Systems are the Next Evolution in Claims Technology
- Gaining a “Wow” Experience from Web Users
- Time to Shift from Business/IT Alignment to Business/IT Alliance
- Healthcare Insurers Changing to Consumer Model
- Organization is the Key for Selecting Software Vendors
- Analysts Expound on the Needs of the Mid-tier Insurance Market
- Finding the Cure for Obamacare’s Website
- New Software Solutions Benefit Insurers on the Inside and Outside
- Products, Market Impede Investment in Systems for Life Insurers
- Combatting Cyber Threats: Predict, Prevent, Persist
- The Future of Telematics Heads Beyond Insurance
- The Shame in Cyber Security Lapses
- Building Policy Administration Systems for the Future
- Insurers Look Into The Eyes of Their Policyholders
- It’s a New Dawn for the ITA
INSURANCE IT NEWS
- Duck Creek Acquires Distribution Management Provider Outline Systems LLC
- Guidewire Congratulates 2018 Innovation Award Winners – Economical Insurance, Motorists Insurance Group, and Zurich Mexico
- Over 70% of Insurers Now Use Some Cloud, Says Novarica
- Zywave Acquires Code SixFour, Bolstering its Suite of Proposal and Marketing Solutions for Insurance Brokers
- The Global InsurTech fund seeks InsurTech investments in Israel
- Selected Funeral and Life Insurance Company Goes LIVE with QLAdmin Solutions
- Crawford Human Risk Services Offers Enhanced Disability Management Services with Crawford EmployerWORKS Software
- Top ERP Systems for 2019
The Email Chat is a regular feature of the ITA Pro magazine and website. We send a series of questions to an insurance IT leader in search of thought-provoking responses on important issues facing the insurance industry.
ITA is pleased to present the 2014 Webinar Series. We have many topics for you to choose from and attendance is open to all ITA members. The webinar topics are current and exciting — ranging from predictive analytics to telematics and will focus on the direction insurance carriers need to follow for the future. All webinars are presented by insurance IT professionals along with some of the leading analysts and consultants in the field. There is no cost to attend an ITA webinar. For more information and to register for the webinar, click the “title” of the webinar below.
BLOGS AND COLUMNS
The Insurance Technology Association is pleased to announce that ITA Live 2019 is scheduled for May 5-7, 2019 at the Marriott Harbor Beach Resort and... READ MORE
It has become a common refrain over the past few years to view the practice of enterprise architecture (EA) as something that time has passed by, much... READ MORE
You have surely heard it said that small businesses are the growth engine for America. Today, the phrase has a special ring to it for benefits... READ MORE
With stagnant growth and lingering low interest rates, the life insurance industry faces a challenging future... READ MORE
Finding insurance carriers willing to write commercial lines risks has always been a challenge for producers... READ MORE
As Guidewire Software prepares for the start of Connections, its 11th annual user conference that begins on Nov. 2, Brian Desmond, chief marketing... READ MORE
Fraud detection has always been and will continue to be a critical component of claims management. Learning the lessons from current claims Straight... READ MORE
- Vendor Views