CAREERS  |  BLOG
State of Cyber Insurance Cybersecurity

State of Cyber Insurance

By Anthony Mini, President | CEO

There are striking similarities between cybersecurity and cyber insurance. The “ones and zeros” from binary to statistical modeling all merge into the overarching domain of risk management. The Key Risk Indicators (KRIs) published in the annual cybersecurity reports from Verizon and the FBI all illustrate that the emerging threats to cybersecurity are growing in frequency and cost.

The FBI noted an increase in cybersecurity incidents in the past four years—from 19,060 in 2016 to 26,074 in 2021. Verizon reported that data breaches nearly doubled in recent years, increasing from 2,260 in 2016 to 5,258 in 2021. Further, CrowdStrike Intelligence, a cybersecurity organization, observed an 82% increase in ransomware-related data breaches from 2020 to 2021. Costs associated with cybersecurity incidents both to the overall economy and to affected organizations are significant. However, cost estimates for these incidents vary widely. For example, in 2018 the Council of Economic Advisers estimated that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016 (The Council). According to a 2018 RAND report, cyber incidents may have cost the economy more than $242 billion per year. A 2020 CISA study, based on data from several datasets published in 2015–2020, reported that the median cost of a cyber incident to a U.S. organization might range from $56,000 to $1.7 million.

As these trends continue to get worse, it is important that organizations seek to better understand the risk they are managing. Throughout this paper, we will address the state of cybersecurity from two vantage points: one being cyber assurance, which are the processes, technologies, and efforts “left of boom” and are proactive in defending against an attack; and the latter being cyber insurance, which are the processes, technologies, and efforts focused on the “right of boom,” after the alert of a cyberattack.

Read more by downloading the white paper.

Download the White Paper

Related Blog Posts

One Disaster Recovery Tip
Cybersecurity

One Disaster Recovery Tip That Could Save Your Business

Imagine crafting a piece of ransomware, a masterpiece designed to stealthily penetrate defenses, encrypting everything in its path, rendering data inaccessible to its rightful owners. The attack begins with phishing emails, exploiting software vulnerabilities, or brute-forcing weak passwords. Once inside,

Read More »
Tips to Help Protect Your Data
Cybersecurity

Tips to Help Protect Your Data

Given the recent AT&T data breach, Anthony Mini recommends the following:
1. Monitor your accounts with identity protection services.
2. Check the status of your e-mail accounts that have been exposed to other breaches using the website: https://haveibeenpwned.com/.<br

Read More »
Pearl Technology Hosts Operation Boomerang Cybersecurity
Cybersecurity

Pearl Technology Hosts Operation Boomerang

Those who attended today’s Operation Boomerang at Peoria’s Riverfront Museum learned some practical tips to stay safe from scammers. The event, which was geared toward protecting seniors from cybercrime, had a great turnout, and attendees walked away with information they

Read More »