The Rough Notes Company Inc.
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here
No Result
View All Result
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here
No Result
View All Result
The Rough Notes Company Inc.
No Result
View All Result
Home From The Latest Issue

FASTEST-GROWING INSURANCE LINE

November 30, 2023
FASTEST-GROWING INSURANCE LINE

More than just insurance, cyber

provides critical support for vital operations

By Joseph S. Harrington, CPCU


Cyber insurance has been around in some form for a little more than 25 years. Over that period, one could say that it has evolved to work like a cross between property/casualty insurance and health insurance.

To be sure, cyber insurance is officially a P-C line whose premiums and losses are reported as such on annual statement forms promulgated by the National Association of Insurance Commissioners (NAIC). As a P-C line, cyber insurance covers losses to property (intangible data and information, for the most part) and liability for injury and damage to others (mostly compromises of confidential information).

That said, cyber risk and cyber insurance have several core features that distinguish them from other types of property and liability risk and coverage:

  • Cyber values at risk (data and information) grow and fluctuate much more rapidly than those for tangible property.
  • Cyber property settings (hardware, software, and networks) evolve much more rapidly than those for tangible property.
  • The perils causing loss to cyber property change quickly; some subside or disappear while new ones arise.
  • Cyber liability can apply even without evidence of a loss to a third party.
  • Cyber insurance is a specialized, non-standardized coverage sold to non-specialists.

Regarding the last point, attorneys, physicians, engineers, human resource professionals, and other specialists presumably understand the nature of their professional and managerial risks, and are generally capable of assessing the merits of that coverage in differing policy forms.

Cyber insurance, on the other hand, is acquired by owner/operators of all types of enterprises, most of whom are not specialists in IT or insurance. They must make the most of a purchase they are strongly advised to make—and often required to make as a condition for entering certain contracts.

Risk financing

Given that cyber insurance is a specialized coverage purchased by non-specialists, it’s not surprising that it shares some characteristics with health insurance, which is also coverage for conditions most people don’t have the training to understand.

Most P-C professionals will be quick to note that health insurance, as commonly understood in the United States, is not really insurance; rather, it is healthcare financing. Whereas first-party property insurance generally seeks to avoid costs of maintenance while covering costs of loss by external factors, health insurance funds basic care to reduce the probability of serious injury or illness.

 “Cyber is the most important coverage out there for agents and brokers.

Your clients are not only purchasing insurance, they’re purchasing

access to highly experienced vendors to assist during a cyber event.”

—Nick Carozza

Senior Vice President

Risk Placement Services

Something similar has happened with cyber insurance.

Simply put, there is no cyber policy worth considering that does not include access to specialists who monitor insured systems for vulnerabilities and who help respond to incidents. Just as no health insurer would cover you without knowing your health conditions, no cyber insurer will underwrite an account unless it can be assured that its client’s systems are well-maintained, regularly updated, and reinforced in the event of a cyber-attack.

Keeping with the health insurance analogy, when you enroll in a health plan, you typically do so with a physician connected to a network of specialists. You are told early on to consult your primary care physician to seek a referral to an “in-network” specialist. Otherwise, if you simply go to a specialist on your own, you may find that you have reduced coverage or no coverage at all.

Service providers

Along the same line, Nick Carozza, a senior vice president for Risk Placement Services, reminds insurance agents and brokers that a cyber policyholder isn’t just buying insurance, but is also buying access to a range of cyber services.

“Cyber is the most important coverage out there for agents and brokers,” he says. “Your clients are not only purchasing insurance, they’re purchasing access to highly experienced vendors to assist during a cyber event.”

Even in the absence of a loss or claim, Carozza says these vendors provide valuable support to insureds, including periodic scans for “open ports” and other system vulnerabilities, plus monitoring of the “dark web” for stolen proprietary or client information.

Beyond this remote monitoring of online security, vendor partners of cyber insurers also provide valuable training to client staff in implementing and maintaining security measures that are often required as conditions of coverage.

To test employee responses to threats, cyber services undertake simulations of “phishing” and “social engineering” attacks, in which cyber criminals impersonate authorized persons to gain access to protected information. These vendors also monitor adherence to “call back” protocols, which are requirements that any online directive for releasing money or information be confirmed by a live phone call before being executed.

Report without fear

In Carozza’s estimation, many cyber insurance buyers could give more consideration to the services provided when purchasing a policy. He estimates that fewer than 10% of cyber insurance buyers make full use of the security services available to them. A major reason for this, he says, is that most insureds rely on internal IT teams or existing service providers to maintain their cyber operations, often overlooking additional vendors they can access.

Carozza notes that participation by a company’s IT team, internal or external, is helpful when completing lengthy, complex, and detailed applications for cyber coverage. Given that, he finds that the most effective approach to cyber risk management is to extend that information sharing through the entire lifecycle of a policy and its renewals.

Carozza emphasizes that, unlike with other types of insurance, cyber insureds need not fear that reporting a loss or potential loss will necessarily impact their premium. “When a cyberattack happens, put your carrier on notice immediately,” he urges.

“If a loss is reported but nothing is paid out, that’s not a bad thing,” he adds. “On the contrary, most cyber insurers will think, ‘This is a good client that wants us to know what’s happening.’”

Indeed, a common mistake Carozza sees among cyber insureds is to take action in response to an event or perceived threat, only to learn later that the action taken does not qualify for coverage because the insurer was not informed beforehand.

According to Carozza, most cyber policies require the insured to contact the carrier or a carrier-affiliated service as soon as the insured is aware of a breach or some other online threat. Acting first and contacting later can cost coverage, but all too often, Carozza finds “there’s a disconnect in that insureds are not aware of their obligations before making a claim.

“Understand, this is typically among the most stressful events in a business owner’s professional career,” he says. “While it’s understandable that they would want to turn to familiar partners to help them through the crisis, that doesn’t absolve them of their responsibility to seek the guidance of their insurer before they do.”

Limits on limits

Agents and brokers have an important role to play in helping their cyber clients identify the additional IT resources available through their cyber policies, Carozza says. They also have an important role in helping cyber insureds get the most of their insurance proceeds.

Although cyber insurance policies are not standardized to the extent of commercial auto, liability, and property policies, cyber policies commonly provide a series of insuring agreements for different types of first- and third-party losses, with each of them subject to an individual or categorical sub-limit.

Given these sub-limits, a cyber insured may be unpleasantly surprised to learn that its recovery for a cyber loss was considerably less than the total amount of insurance provided by the policy. “The insured might think it has $1 million in coverage,” says Carozza, “but sub-limits on first-party coverages can drastically restrict the amount of recovery.”

In all, the real value of a cyber policy lies in how its limits and support services align with the operations and risk profile of a client. That amounts to great opportunity for diligent agents and brokers seeking to capitalize on the ample opportunities presented by the fastest growing line of insurance. n

For more information:

Risk Placement Services

www.rpsins.com

The author

Joseph S. Harrington, CPCU, is an independent business writer specializing in property and casualty insurance coverages and operations. For 21 years, Joe was the communications director for the American Association of Insurance Services (AAIS), a P-C advisory organization. Prior to that, Joe worked in journalism and as a reporter and editor in financial services.

Tags: cyber insuranceExcess and Specialty linesinsurance industry
Previous Post

2023 RN Community Service Award Opportunity

Next Post

WILDFIRE RISK ASSESSMENTS

Next Post
WILDFIRE RISK ASSESSMENTS

WILDFIRE RISK ASSESSMENTS

FEATURES/ COLUMNS/ DEPARTMENTS

  • Agency of the Month (100)
  • Agency Partners (38)
  • Alternative Risk Transfer (28)
  • Benefits & Financial Services (159)
  • Benefits Lead (104)
  • Commercial Lines (122)
  • Court Decisions (335)
  • Coverage Concerns (177)
  • Excess and Specialty Lines (103)
  • From The Latest Issue (568)
  • General Articles (265)
  • Management (795)
  • Marketing (2)
  • Organizational Profiles (82)
  • Personal Lines (101)
  • Producers Blog (53)
  • RN Blog Top Q&A For Agents (85)
  • Specialty Lines (257)
  • Technology (176)
  • Trending Blogs (160)
  • Young Professionals (107)
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop

By continuing to browse the site, you agree to the data collection and processing practices disclosed in our recently updated privacy policy.

©The Rough Notes Company. No part of this publication may be reproduced, translated, stored in a database or retrieval system, or transmitted in any form by electronic, mechanical, photocopying, recording, or by other means, except as expressly permitted by the publisher. For permission contact Samuel W. Berman.

Sitemap

No Result
View All Result
  • Home
  • About
  • Publications
  • RN Newsletter
  • Products & Solutions
  • Media Kits
  • Contact Us
  • Shop
    • Catalog
    • Enter Promo Code
    • Pay Your Existing Bill Here

By continuing to browse the site, you agree to the data collection and processing practices disclosed in our recently updated privacy policy.

©The Rough Notes Company. No part of this publication may be reproduced, translated, stored in a database or retrieval system, or transmitted in any form by electronic, mechanical, photocopying, recording, or by other means, except as expressly permitted by the publisher. For permission contact Samuel W. Berman.

Sitemap