When it comes to cyber risk insurance, broad coverage for ransomware is more important than ever. Organizations need to be careful however, not to develop a false sense of security over the simple placement of cyber insurance. Not all ransomware coverage is created equal – terms differ significantly from one insurer to another. At their most basic, policies should provide coverage for: 1) extortion demands/payments and reasonable associated fees, 2) resulting lost income, 3) asset restoration and potentially 4) reward reimbursement. A closer look should also be given to the definitions, terms and conditions as outlined below.
DEDUCTIBLES & SUB-LIMITS: Most policies sub-limit coverage for cyber extortion. With the surge of recent ransomware attacks over the past few years those sub-limits are getting lower and lower, which is why it’s more important than ever, to review policy limits carefully. The ransoms themselves are only one small part of the financial damage inflicted. For most organizations, the lost income resulting from downtime and reputational damage is a far greater concern and often more costly. Forensic investigations, network and asset restoration costs, and costs to improve network security further compound the damage of these attacks. All of these damages should be taken into account when performing a limit review. It’s also important to remember that, making a ransom payment may result in the payor being placed on a “white list” thus creating a soft target for follow up ransom demands. Due to this potential, organizations should keep in mind the possibility of sustaining follow up attacks.
DEFINITION OF EXTORTION THREATS: Basic policy forms that limit “extortion threats” to threats to “sell or disclose PII” should be avoided entirely. With hackers shifting their focus from more traditional protected data, to targeting corporate IP and computer/control systems, it’s critical that policies contain broad definitions of extortion, including threats to:
Lastly, with ransomware gangs increasingly seeking assistance from inside actors, it’s critical that acts of rogue employees are covered in connection with the above threats.
DEFINITION OF COMPUTER SYSTEMS: Ransomware can affect a wide range of targets from data, to computer networks, to security cameras and control systems. Which is why the policy definition of “computers systems” should be as broad as possible, including the following systems owned, leased, or operated by the insured: hardware, software, firmware, virtual systems, operating systems, virtual machines, wireless devices, backups (including offline backups), ICS & SCADA systems, telephone systems, networking equipment, associated devices, media, and IOT devices.
With most organizations relying on 3rd party providers for data storage and software solutions, it’s important to consider how a ransom demand affecting a cloud provider might implicate coverage. In order to ensure the carrier will respond, insureds should carefully review the definition of “external computer systems” to ensure the definition includes those systems mentioned above, owned, leased or operated by 3rd party business providers as well.
DEFINITION OF EXTORTION EXPENSES: The costs associated with extortion demands extend beyond just the demand itself. To ensure these costs are covered by the insurer, policyholders should review their policies to ensure the definitions of such expenses extend to cover:
It’s also important to remember that many policies require pre-approval prior to making any extortion payments. Accordingly, policyholders that find themselves victims of ransomware should be extremely careful in making any payments before consulting their brokers and respective insurers.
DEFINITION OF DATA RESTORATION: Most cyber insurance policies provide coverage for costs related to the recovery, replacement or restoration of data. However some policies specify the data must be “damaged” or “destroyed”. If a ransomware gang steals an organizations’ data and refuses to release the files, it could be argued the data was stolen and not actually damaged or destroyed. Policyholders should ensure their policies also explicitly include lost or stolen data as well. Additionally, broader cyber policies will also include coverage for:
The definition of “data” should also be equally broad to include any software, program or electronic data. Some policies will limit covered data, only to that which is subject to regular backups. Such a requirement should be removed.
DEFINITION OF LOST INCOME: In addition to providing coverage for the net profit or loss during a business interruption, the policy should also provide coverage for:
EXCLUSIONS: Some policies contain notable exclusions that severely restrict coverage for certain damages. The following exclusions should be reviewed carefully, and avoided or softened as much as possible.
CONDITIONS PRECEDENT TO COVERAGE: Some policy forms contained a longer list of conditions required to be met prior to coverage being triggered, those might include: making every reasonable effort to determine extortion is not a hoax and/or requiring the ransom to be negotiated. These should be avoided due to being a minority in the marketplace, and putting undue burden on the insured.
It’s also important to remember that cyber insurance is no replacement for strong internal controls, which all organizations should be implementing. Regular (and multiple) encrypted backups, advanced email detection, password change protocols, and employee training programs are some of the most effective controls in preventing such attacks.
To receive our assessment guides, coverage checklists, updates and alerts as they are released SUBSCRIBE HERE