Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • Multi-Factor Authentication: A Key to Cyber Risk Insurance Coverage
  • Critical Vulnerability
  • Data Breach
  • Malware
  • Vulnerabilities

Multi-Factor Authentication: A Key to Cyber Risk Insurance Coverage

4 years ago Anastasios Arampatzis
Multi-Factor Authentication: A Key to Cyber Risk Insurance Coverage

Cyber-attacks are becoming more sophisticated and devastating, especially for small and medium enterprises (SMEs). With ransom demands rising and the cost of data breaches soaring, businesses are investing heavily in building their cyber defenses. However, cybersecurity is not bullet-proof. Buying a cyber risk insurance program can help outsource residual risk, and deploying multi-factor authentication is a prerequisite not only for getting coverage but also for lowering premiums.

Cyber-attacks are becoming an existential problem

Throughout 2021, public and private organizations felt the significant impacts of the ever-changing cyber threat landscape. Ransomware dominated the threat landscape in 2021. The targeted nature of attacks coupled with the growing sophistication of cybercriminals resulted in extensive losses for organizations worldwide. The threat will increase with ransomware-as-a-service expanding its scope and reach.

In the first six months of 2021, the U.S. Treasury Department’s Financial Crimes Enforcement Network reported that the value of ransomware-related suspicious activities was $590 million compared to $421 million for the entire of 2020. Meanwhile, the United Kingdom’s National Cyber Security Centre (NCSC) reported that in just the first four months of 2021, it handled the same number of ransomware incidents as it did in all of 2020 — which was triple the number the NCSC faced in 2019.

According to the IBM 2021 Cost of Data Breach Report, the average cost of a ransomware breach has increased to $4.62 million, while the total cost of a data breach has increased by 10% from 2020 to 2021. Costs are related to four groups of activities associated with data breaches: detection and escalation, notification, lost business, and post-breach response. Lost business represents the largest share of breach costs (38%).

As cyber criminals mature and advance their tactics, small and medium businesses become the most vulnerable because they lack the capacity – staff, technology, budget – to build strong cyber defenses. SMEs can quickly become the low-hanging fruit for criminals wishing to target larger enterprises through complex supply chains. If you add the expanding regulatory landscape with extensive security and privacy requirements, you can understand why cyber insurance coverage is an existential issue for small and medium enterprises.

Why should you get cyber insurance coverage?

As businesses become more and more digitized, they are exposed to greater cyber risks. Cyber insurance could mitigate the resulting business impact if the technology became unavailable because of a cyber incident. Even if investing in building cybersecurity controls is essential, these controls are not impenetrable. Cyber-attacks are a question of when and not if, so cyber insurance becomes crucial for ensuring business continuity.

Compliance is another critical reason for getting cyber insurance. Highly regulated industries such as healthcare and finance are no longer the only industries facing the risk of penalties for cyber security and privacy compliance failures. All companies are subject to state-specific data breach laws for collecting, processing, and storing personal data. Cyber insurance can help cover costs to comply with state, federal, and international laws, as well as cover regulatory fines and penalties.

Overall, having cyber insurance coverage is a demonstration of due diligence. With cybersecurity being a top priority for many executives, cyber risk insurance is top-of-mind for a diligent board.

What are the critical security requirements for securing cyber insurance?

When you contact a cyber insurer to discuss the potential of getting insurance coverage, they will first assess your current cybersecurity posture. If your posture is considered too risky, you will probably be denied getting insured. Insurers want to help you mitigate the residual risk, but they also want to secure their investment.

During their assessments, they look for four critical security requirements, the lack of which are a no-go for further discussions, says Nikos Georgopoulos, Cyber & Information Privacy Risks Insurance Advisor at Cromar. These four critical prerequisites are:

  1. Regularly back up critical data to an “offline” location that would be unaffected by a security incident in your business environment. Test to ensure those backups are recoverable.
  2. Use multi-factor authentication (MFA) for all your services and applications – cloud-based and on-premises – and for all your employees, not only the privileged accounts.
  3. Do not allow remote access to a corporate network without a virtual private network (VPN).
  4. Provide regularly and at least annually cybersecurity awareness training, including anti-phishing, to all individuals who have access to your organization’s network or confidential/personal data.

The importance of multi-factor authentication

“MFA is one of the most important cybersecurity practices to reduce the risk of intrusions—according to industry research, users who enable MFA are up to 99 percent less likely to have an account compromised,” reads a joint CISA – FBI advisory.

In fact, multi-factor authentication is recommended or required by several regulations, including:

  • President Biden Executive Order on Improving the Nation’s Cybersecurity
  • Office of Management and Budget (OMB) Memorandum on Moving the U.S Government Toward Zero Trust Cybersecurity Principles
  • ENISA guidelines on Boosting your Organization’s Cyber Resilience

It is, therefore, no surprise that MFA is a prerequisite for getting cyber insurance. Even if a business has met all other requirements, it will have difficulty obtaining insurance if they haven’t deployed MFA. “No MFA, no cyber insurance,” notes Nikos Georgopoulos.

Cyber insurance is the tool that can help small and medium enterprises become cyber resilient. However, before even starting discussions with an insurer, it is important that businesses do their part and invest in basic cyber hygiene controls, including multi-factor authentication.

The post ” Multi-Factor Authentication: A Key to Cyber Risk Insurance Coverage” appeared first on TripWire

Source:TripWire – Anastasios Arampatzis

Tags: Cloud, Compliance, Critical Severity, Finance, Goverment, Low Severity, Malware, Medium Severity, Phishing, Privacy, Ransomware, TripWire, Vulnerability

Continue Reading

Previous CIS Control 18 Penetration Testing
Next CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

6 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)

Recent Posts

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists
  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT