MT TL
Follow Us
ITA MEMBERSHIP

RISK / SECURITY

RISK / SECURITY

You Are a Target for a Cyber Attack

Bryant G. Tow | March 19, 2014

In the insurance space, I hear a few common statements about cyber security: “I am just an independent agent” or “We are only a small regional company. Who would want anything we have?”  And my favorite, “The cyber criminals are only interested in the big boys.”

Cyber criminals know large companies have sophisticated defenses and the task of getting through them is daunting and costly. However, smaller organizations lack budget for IT security and rarely have even one person focused on protecting their organization.

Of the 621 confirmed data breach incidents reported in the annual Verizon Data Breach Report recorded in 2012, close to half occurred at companies with fewer than 1,000 employees, including 193 incidents at entities with fewer than 100 workers.

Symantec (one of the industry’s largest security firms) confirmed that trend. It found cyber-attacks on small businesses with fewer than 250 employees represented 31 percent of all attacks in 2012, up from 18 percent in the prior year.

Forbes magazine reported big business CEOs listed cyber security as one of their top three issues, yet small businesses are not paying security the attention it needs.  Thus, your organization is the focal point of the attack.  The common philosophy of cyber warfare is simple: Why attack the wolf when there are plenty of sheep for the slaughter.

By now you have likely heard of the Target security breach and how over 110 million credit card numbers were stolen by hackers.  The root cause of that breach was an unsuspecting HVAC vendor.  Fazio Mechanical Services was founded in Pittsburgh, Pa. with a few branch offices focusing specifically on supermarkets.

It has been reported that an email password stealing malware attack at Fazio two months prior to the attack led the attackers straight into the Target servers.  Since then I have seen as exponential increase in vendor security audits in both directions.  Suppliers of technology services like many of the systems insurers use to process claims and manage billing are making sure their customers are following proper practices and customers are asking suppliers to properly protect their data.

Regardless of your position on the food chain in the insurance space you need to be paying attention to the security of your organization.   Agencies and carriers need to validate the security of their providers.  There is a dramatic push toward the cost-effective model of cloud computing, especially among the small and middle market agencies. We outsource processing, service desks, call centers, system maintenance and anything else that can provide an increased level of productivity with a decreased cost. Many agencies are now migrating entirely toward cloud-based systems that only require a browser on their office PC.

All of your data is being stored, processed and moved through the vendor’s systems.  Are you sure it is safe?  It is up to you to validate the security of your data.  It will be your name in the headlines.

The best place to start is to get someone with the proper security credentials like a Chief Information Security Officer (CISO) to administer a security validation audit program for each of your vendors on a regular basis.  This person should report regularly to the C-suite and the board of directors on their progress.

Here is a list of the categories your CISO will be looking for each vendor to have in place:

  • Physical / Environmental Security
  • Risk Assessment and Mitigation
  • Regulatory Compliance
  • Human Resource Security and Practices
  • Access Control          
  • Change Management
  • Asset Management   
  • Network Configuration and Management    
  • Systems Monitoring and Logging    
  • Systems Configuration and Management     
  • Business Continuity Planning
  • Security in Software Development   

Each of these items will have a metric associated with it and should be measured against industry best practices and standards such as ISO27001, PCI DSS and any other compliance targets that may apply.

The biggest obstacle I see with regard to information security is complacency and resistance to change, especially in mature organizations that have been operating a certain way for many years.  The attitude, “We have always done it this way,” will land you right out of business.

Budget line items for cyber security are rarely allocated until after the breach. By then it is too late.  The average cost of a breach according to the Ponemon Institute was $8.9 million in 2012 up from $5 million in 2011.  The more appropriate question is not whether you are a target but are you prepared for the attack when it comes.

Bryant G. Tow is an enterprise security executive, published author, and speaker with over 20 years of experience in technology.

 


Featured articles

Guidewire MR

PS MR Data Study

ELECTRONIC CHAT

The Email Chat is a regular feature of the ITA Pro magazine and website. We send a series of questions to an insurance IT leader in search of thought-provoking responses on important issues facing the insurance industry.

WEB EVENTS

ITA is pleased to present the 2014 Webinar Series. We have many topics for you to choose from and attendance is open to all ITA members. The webinar topics are current and exciting — ranging from predictive analytics to telematics and will focus on the direction insurance carriers need to follow for the future. All webinars are presented by insurance IT professionals along with some of the leading analysts and consultants in the field. There is no cost to attend an ITA webinar. For more information and to register for the webinar, click the “title” of the webinar below.

BLOGS AND COLUMNS

only online

Only Online Archive

ITA Pro Buyers' Guide

Vendor Views

Partner News