The trusted source of unique, data-driven insights on insurance to inform and empower consumers. Insurance Information Institute

Cyber Insurance: Why Do Small Firms Do Without?

Small-business owners know cyber risk threatens them – but many still are dubious about cyber insurance. Why?

Smaller businesses seem to be getting the message that cyber risk isn’t just something for big companies to worry about; nevertheless, many still balk at buying cyber insurance, according to a new survey from the Insurance Information Institute (I.I.I.) and J.D. Power.

The 2019 Small-Business Cyber Insurance and Security Spotlight found that 12 percent of survey respondents experienced at least one cyber incident in the past year, up from 10 percent in 2018.  Nearly 71 percent said they are “very concerned” about cyber incidents, up from 59 percent, and 75% said they believe the risk of being attacked is growing at an alarming rate, up from 70 percent last year.

Two of the top four reasons cited for not buying cyber coverage are within insurers’ control.

Respondents with cyber insurance increased this year, to 35 percent from 31 percent; but of the 44 percent who said they don’t have cyber coverage and the 21 percent who didn’t know if they do, 64 percent said they don’t plan to buy it in the next 12 months.

Why the hesitation?

Why are many smaller firms so reluctant to insure against a threat they recognize to be real and growing?

The top two reasons given were: cost (42 percent) and the belief that the companies’ risk profiles don’t warrant coverage (35 percent). Twenty-seven percent said they believe they handle cyber risk sufficiently well internally, and 17 percent cited “too many exclusions” as a reason for not buying coverage. For the non-insurers in the audience, “exclusions” are provisions in an insurance agreement that limit the scope of coverage.

So, in other words, two of the top four reasons cited by insureds for not buying cyber coverage – cost and exclusions – are within insurers’ control.

As David Pieffer, head of J.D. Power’s property and casualty insurance practice, put it:

“Given small companies’ growing awareness and concerns about cyberrisk, insurers and agents and brokers might be able to increase their overall support of this market by addressing the issues of affordability and coverage limitations that seem to be an obstacle to purchasing.”

Risk-mitigation support may help

Closely related to cost is the question of value. What do insureds get for their premium dollar?

Among the respondents with cyber coverage, 70 percent said their insurer helps with cyberrisk mitigation, up from 65 percent in 2018. Fifty-one percent said their insurer offers contingency planning for data breaches, up from 40 percent, and 53 percent said their insurer will assess their vulnerability to data breaches, up from 51 percent.

“We’re seeing more insurers work with commercial customers to mitigate risks – in particular, with small and mid-size businesses,” said Sean Kevelighan, I.I.I. president and CEO. “We know many of the large cyber incidents can be sourced back to a smaller business or vendor, and, thus, it’s increasingly critical to assist in loss prevention measures that can make the customer more resilient, while also reducing claims and damages.”

It’s hard to say based on the data, but perhaps such insurer involvement plays as significant a role in small companies’ increased adoption of cyber insurance as does their growing anxiety about cyber perils. As companies increasingly see cyber insurers as trusted risk-management partners – not just writers of policies and payers of claims – perhaps take up rates will accelerate.

Wildfire evacuation: What to take?

Two wildfires in California are spreading today (Oct. 27), fanned by high winds overnight, forcing tens of thousands to evacuate.

If you are forced to evacuate, here is a list of what to take, culled from a III article on evacuation planning:

  • Prescriptions and other medicines
  • First aid kit
  • Bottled water
  • Flashlight, battery-powered radio and extra batteries
  • Clothing and bedding (sleeping bags, pillows)
  • Special equipment for infants or elderly or disabled family members
  • “Comfort items,” such as special toys for children
  • Computer hard drive and laptop
  • Cherished photographs
  • Pet food and other items for pets (litter boxes, leashes)

From the same article, here is a list of key documents:

  • Prescriptions
  • Birth and marriage certificates
  • Passports
  • Drivers license or personal identification
  • Social Security cards
  • Insurance policies — homeowners, auto, life and any others
  • Recent tax returns
  • Employment information
  • Wills and deeds
  • Stocks, bonds and other negotiable certificates
  • Financial information such as bank, savings and retirement account numbers and recent tax returns
  • Home inventory

Unfortunately, though, if you are told to evacuate it will be too late to search the house for all this stuff. When authorities tell you to leave you must leave immediately. The fire could be on you in moments.

Bridging the Cyber Insurance Data Gap

 

 

Cyber risks are opportunistic and indiscriminate, exploiting random system flaws and lapses in human judgment.

Underwriting cyberrisk is beyond difficult. It’s a newer peril, and the nature of the threat is constantly changing – one day, the biggest worry is identity theft or compromise of personal data. Then, suddenly it seems, everyone is concerned about ransomware bringing their businesses to a standstill.

Now it’s cryptojacking and voice hacking – and all I feel confident saying about the next new risk is that it will be scarier in its own way than everything that has come before.

This is because, unlike most insured risks, these threats are designed. They’re intentional, unconstrained by geography or cost. They’re opportunistic and indiscriminate, exploiting random system flaws and lapses in human judgment.  Cheap to develop and deploy, they adapt quickly to our efforts to defend ourselves.

“The nature of cyberwarfare is that it is asymmetric,” wrote Tarah Wheeler last year in a chillingly titled Foreign Policy article, In Cyber Wars, There Are No Rules.  “Single combatants can find and exploit small holes in the massive defenses of countries and country-sized companies. It won’t be cutting-edge cyberattacks that cause the much-feared cyber-Pearl Harbor in the United States or elsewhere. Instead, it will likely be mundane strikes against industrial control systems, transportation networks, and health care providers — because their infrastructure is out of date, poorly maintained, ill-understood, and often unpatchable.”

This is the world the cyber underwriter inhabits – the rare business case in which a military analogy isn’t hyperbole.

We all need data — you share first

In an asymmetric scenario – where the enemy could as easily be a government operative as a teenager in his parents’ basement – the primary challenge is to have enough data of sufficiently high quality to understand the threat you face. Catastrophe-modeling firm AIR aptly described the problem cyber insurers face in a 2017 paper that still rings true:

“Before a contract is signed, there is a delicate balance between collecting enough appropriate information on the potential insured’s risk profile and requesting too much information about cyber vulnerabilities that the insured is unwilling or unable to divulge…. Unlike property risk, there is still no standard set of exposure data that is collected at the point of underwriting.”

Everyone wants more, better data; no one wants to be the first to share it.

As a result, the AIR paper continues, “cyber underwriting and pricing today tend to be more art than science, relying on many subjective measures to differentiate risk.”

Anonymity is an incentive

To help bridge this data gap, Verisk – parent of both AIR and insurance data and analytics provider ISOyesterday announced the launch of Verisk Cyber Data Exchange.  Participating insurers contribute their data to the exchange, which ISO manages – aggregating, summarizing, and developing business intelligence that it provides to those companies via interactive dashboards.

Anonymity is designed into the exchange, Verisk says, with all data aggregated so it can’t be traced back to a specific insurer.  The hope is that, by creating an incentive for cyber insurers to share data, Verisk can provide insights that will help them quantify this evolving risk for strategic, model calibration, and underwriting purposes.

Tapping the insurance ecosystem for insights

I had the pleasure last week of attending “Data in the New: Transforming Insurance” – the third annual insurtech-related thought leadership event held by St. John’s University’s Tobin Center for Executive Education and School of Risk Management.

To distill the insights I collected would take far more than one blog post.  Speakers, panelists, and attendees spanned the insurance “ecosystem” (a word that came up a lot!) – from CEOs, consultants, and data scientists to academics, actuaries, and even a regulator or two to keep things real. I’m sure the presentations and conversations I participated in will feed several posts in weeks to come.

Herbert Chain, executive director of the Center for Executive Education of the Tobin College of Business, welcomes speakers and attendees.
Just getting started

Keynote speaker James Bramblet, Accenture’s North American insurance practice lead, “set the table” by discussing where the industry has been and where some of the greatest opportunities for success lie. He described an evolution from functional silos (data hiding in different formats and databases) through the emergence of function-specific platforms (more efficient, better organized silos) to today’s environment, characterized by “business intelligence and reporting overload”.

Accenture’s James Bramblet discusses the history and future of data in insurance.

“Investment in big data is just getting started,” Jim said, adding that he expects the next wave of competitive advantage to be “at the intersection of customization and real time” – facilitating service delivery in the manner and with the speed customers have come to expect from other industries.

Jim pointed to several areas in which insurers are making progress and flagged one – workforce effectiveness – that he considers a “largely untapped” area of opportunity. Panelists and audience members seemed to agree that, while insurers are getting better at aggregating and analyzing vast amounts of data, their operations still look much as they have forever: paper based and labor intensive. While technology and process improvement methodologies that could address this exist, several attendees said they found organizational culture to be the biggest obstacle, with one citing Peter Drucker’s observation that “culture eats strategy for breakfast.”

Lake or pond? Raw or cooked?

Paul Bailo, global head of digital strategy and innovation for Infosys Digital, threw some shade on big data and the currently popular idea of “data lakes” stocked with raw, unstructured data. Paul said he prefers “to fish in data ponds, where I have some idea what I can catch.”

Data lakes, he said, lack the context to deliver real business insights. Data ponds, by contrast, “contain critical data points that drive 80-90 percent of decisions.”

Stephen Mildenhall, assistant professor of risk management and insurance and director of insurance data analytics at the School of Risk Management, went as far as to say the term “raw data” is flawed.

“Deciding to collect a piece of data is part of a structuring process,” he said, adding that, to be useful, “all data should be thoroughly cooked.”

Innovation advice

Practical advice was available in abundance for the 80-plus attendees, as was recognition of technical and regulatory challenges to implementation. James Regalbuto, deputy superintendent for insurance with the New York State Department of Financial Services, explained – thoroughly and with good humor – that regulators really aren’t out to stifle innovation. He provided several examples of privacy and bias concerns inherent in some solutions intended to streamline underwriting and other functions.

Perhaps the most broadly applicable advice came from Accenture’s Jim Bramblet, who cautioned against overthinking the features and attributes of the many solutions available to insurers.

“Pick your platform and go,” Jim said. “Create a runway for your business and ‘use case’ your way to greatness.”

From the I.I.I. Daily: Our most popular content, October 11 to October 17

Here are the 5 most clicked on articles from this week’s I.I.I. Daily newsletter.

To subscribe to the I.I.I. Daily email daily@iii.org.

 

 

 

 

Trip Coverage: It’s Not Just About Cancellations

As I’ve written previously, many who travel for pleasure think little, if at all, about the risks associated with their destinations and plans. Travel insurance, such folks believe, is to cover the cost and inconvenience of trip cancellations and lost luggage.

Who wants to think about illness, accidents, and – you know, the other thing – when going on holiday?

You don’t buy travel insurance for the best-case scenario. It’s when the worst happens you will likely regret not having it.

Industry numbers seem to bear this out. A recent report by the U.S. Travel Insurance Association (USTIA) found Americans spent nearly $3.8 billion on travel insurance in 2018, up nearly 41 percent from 2016.  However, trip cancellation/interruption coverage accounted for nearly 90 percent of the benefits purchased. Medical and medical evacuation benefits accounted for just over 6 percent.

Most common claim, but…

Indeed, trip cancellation is the most common claim paid on travel policies (or so I’m told – insurers hold their claims data close to the vest). Assuming this is the case, one might be tempted to roll the dice when it comes to occurrences that seem less likely – say, an automobile accident, a bad fall, or a heart attack or stroke.

Last week’s story about a 22-year-old Briton fighting for his life after falling from a hotel balcony in Ibiza got me thinking about value of the “post-departure benefits” of travel insurance. According to the article, the young man had insurance, though it wasn’t clear what kind of coverage he’d bought. The article did say his parents are soliciting funds on line to help with expenses.

“Globally, an estimated 37 million unintentional falls requiring medical treatment occur each year” write researchers in the journal Injury Epidemiology, citing 2018 World Health Organization (WHO) data. Unsurprisingly, alcohol consumption was found to be a major risk factor in these falls.

During one three-month period in 2018, the BBC reported, citing the Association of British Travel Agents, “11 British holidaymakers have been reported as falling from a balcony – with eight of them in their teens or 20s.” In March 2019, a Missouri man fell from the balcony of a Florida hotel where he was vacationing. In the same month, a Michigan teen on vacation in Cancun fell to his death.

Think you’re too smart, careful, or abstemious to fall from a balcony? Well, the most common cause of injury and death on vacation isn’t falls. It is – you guessed it – automobile accidents. According to a WHO and World Bank report, “deaths from road traffic injuries account for around 25% of all deaths from injury”.

According to the Centers for Disease Control and Prevention (CDC) 1.3 million people are killed and 20-50 million injured in crashes worldwide annually. The CDC says 25,000 of those deaths involve tourists.

There are things you can’t predict

Or maybe you avoid a fall or a crash and wind up in a situation like New Yorker Steve Lapidus, who credits his $79 travel insurance policy with saving his life when he became seriously ill while on vacation in Italy. Steve was in a coma for several days with sepsis and pneumonia and given 50/50 odds of surviving. But, after six-and-a-half weeks of medical care, doctors cleared him to fly home.

Man who fell ill during overseas trip says Richmond travel insurance company saved his life

The problem was, he couldn’t walk and needed special care and a specially modified plane. Lufthansa built a special pod within one of its commercial flights.

That $79 policy covered the entire $70,000 bill.

Plan for the best – insure for the worst

No one wants to buy insurance. Who on Earth would choose to buy a product that, under the best possible circumstances, they never use?

But you don’t buy insurance for the best-case scenario. It’s when the worst happens that you will likely regret not having it.

 

 

 

A world without TRIA: premiums skyrocket following 9/11

Below is an abstract from the I.I.I. database citing a Wall Street Journal article from October 8, 2001. It describes the sharp increase in insurance rates immediately following the terrorist attacks of 9/11 2001.

The abstract is part of our series covering the Terrorism Risk Insurance Act of 2002 (TRIA). The act made public and private sharing of insured losses from acts of terrorism in the United States possible.

I.I.I.’s report, A World Without TRIA: Incalculable Risk, describes the function of the federal  terrorism backstop.

Wedding Big Rigs to IoT: What Could Possibly Go Wrong?

“We went out again. We got maybe six steps before lights blared in our faces. It had crept up, big wheels barely turning on the gravel. It had been lying in wait and now it leaped at us, electric headlamps glowing in savage circles, the huge chrome grill seeming to snarl.”

Transportation and logistics companies are now among the top-targeted industries by computer hackers

When Stephen King wrote Trucks – a tale of big rigs, pickups, and earth movers coming suddenly to life and terrorizing people they had trapped in a diner – he didn’t speculate about how or why they’d been incited to malevolence. Aliens? The Soviets? Who cared? It was the 1970s, and all he needed to do was deliver a solid horror yarn.

I loved that story when I read it in high school – mainly because it scared the daylights out of me and yet I knew for sure it couldn’t happen. Could it? Nah!

Today I read an article about “platooning”, in which “a lead vehicle wirelessly assumes control over the throttle and braking of one, two, or more vehicles following along behind it. In many scenarios, the drivers in a platoon continue to steer their vehicles and can disengage from the convoy at any time, but the first vehicle determines the speed and braking maneuvers of the entire platoon. Because the follower trucks maintain constant communication with the lead vehicle and have synchronized acceleration and braking, platooning trucks can maintain much shorter distances between themselves as they travel.”

Bam! I was right back in that 1970s diner inside Stephen King’s warped, brilliant, and quite possibly prophetic brain.

From there I time traveled forward to Bastille Day 2017 in Nice, France, where 84 people were killed when a radicalized individual plowed a 20-ton truck into a crowd waiting to watch a fireworks display. The previous December, CNN reminded me, 12 people were left dead and 48 injured when a tractor trailer was driven into a Berlin Christmas market.

“Platooning, which is based on vehicle-to-vehicle (V2V) communications, has been shown to increase the fuel efficiency of both the lead and following vehicles, saving fleet operators money and reducing carbon dioxide emissions,” the article in Verisk’s Visualize insurance news and thought leadership site tells me comfortingly. It cites a German pilot program in which truck platooning generated fuel savings of 3 to 4 percent. Platooning could lead to huge cost savings for businesses and consumers.

Who doesn’t love fuel efficiency?

And then I read an article in Today’s Trucking that began:

“When Harold Sumerford’s phone rang at 2:30 a.m. on April 2, he knew the news couldn’t be good. But he figured it was probably the safety department – not the CFO telling him the company’s entire computer system was down from a ransomware attack.”

Sumerford is CEO of J&M Tank Lines. According to the article, it took four days for his company to begin functioning after the attack, “and during those four days, they weren’t able to bill any customers or enter anything into the system.”

Granted, this is a far cry from having the entire fleet go on a murderous rampage, but the Internet of Things is still young.  It hasn’t been long since researchers demonstrated that they could remotely do everything from altering a big rig’s  instrument panel to triggering unintended acceleration or disabling brakes.

“These trucks carry hazardous chemicals and large loads,”  Bill Hass, one of the researchers from the University of Michigan’s Transportation Research Institute, told Wired. “If you can cause them to have unintended acceleration…I don’t think it’s too hard to figure out how many bad things could happen with this.”

J&M’s experience, according to Today’s Trucking, was “just one example of a rapidly growing problem with cybersecurity in the trucking industry. Transportation and logistics companies are now among the top-targeted industries by computer hackers.”

According to an article in ZDNet published just a few weeks ago, “Hackers are deploying previously unknown tools in a cyberattack campaign targeting shipping and transport organisations with custom trojan malware. Identified and detailed by researchers at Palo Alto Networks’ Unit 42 threat intelligence division, the campaign has been active since at least May 2019 and focuses on transportation and shipping firms operating out of Kuwait in the Persian Gulf.”

This as everyone I know seems to be panting with enthusiastic anticipation for vehicles that drive themselves!

Look, I’m no Luddite. I appreciate the benefits offered by and realized through interconnectivity.

But I also have a front row seat observing the difficulties people who assess and quantify risk for a living experience in getting and keeping their heads around the ever-changing world of cyberrisk.  As data and “stuff” become increasingly intertwined and the risks surrounding them are less clearly defined, is it so unreasonable to suggest that pushing humans out of the driver’s seat at this moment isn’t the only or best path to traffic safety, low prices, and reducing our collective carbon footprint?

From the I.I.I. Daily: Our most popular content, September 27 to October 3

Here are the 5 most clicked on articles from this week’s I.I.I. Daily newsletter.

To subscribe to the I.I.I. Daily email daily@iii.org.

 

 

 

 

Older Generations More Cyber Savvy Than Their Younger Counterparts

By Loretta Worters, Vice President, Media Relations, Insurance Information Institute

Getty images

Despite a never-ending cycle of cyber breach headlines, individuals continue to be underprepared for even the most common cyber exposures.  According to Chubb’s third annual Cyber Risk Survey, which examined individuals’ comprehension of cyberrisk and the steps they are taking to protect themselves, complacency seems to have taken hold: eight-in-10 Americans continue to be concerned about a cyber breach, yet only 41 percent use cybersecurity software and only 31 percent regularly change their passwords. These numbers are virtually unchanged from 2018.

According to Chubb’s survey, individuals don’t recognize the value of individual pieces of personal data. For example, just 18 percent of respondents are concerned about their email addresses being compromised. Similarly, only 27 percent of respondents cite concern about their medical records being breached.

The UK’s National Cyber Security Centre (NCSC), which analyzed passwords belonging to accounts worldwide that had been breached bares the Chubb survey out.  The NCSC notes that several combinations of numbers made up the top 10, while “blink182” was the most popular musical artist and “superman” the most common fictional character. But “123456” was the most common password, with 23.2 million accounts using the easy-to-decipher code. “123456789” was used by 7.7 million, while “qwerty” and “password” were each used by more than 3 million accounts.

Chubb survey results indicate that a consistently large portion of older respondents employ better cyber practices than younger generations. Per the survey, 77 percent of those 55 years and older delete suspicious emails, compared to half (55 percent) of respondents between 35 to 54 and just a third (36 percent) of respondents from 18 to 34. Similar patterns arise when looking at those enrolled in cybersecurity monitoring services, where 53 percent of respondents over 55 are enrolled in a cybersecurity monitoring service.  But this same service is used by only 1 percent of respondents between 35 to 54 and just 29 percent between 18 and 34.

More concerning is that the behavior of younger generations appears to be getting worse, the Chubb report noted. For example, 76 percent and 74 percent of adults over 55 regularly deleted suspicious emails in 2017 and 2018, respectively, as compared to just 47 percent and 40 percent of adults between 18 and 34 during the same time period.

In most narratives, it’s the younger generation teaching older generations about the latest internet trends. When it comes to cyber safety, however, it’s clear that the tables have turned. The first lesson older generations should impart? The importance of talking with an independent agent and broker about coverage for a cyber-related incident.

Without it, and in the event of a hack or breach which leads to a financial loss, individuals could be left without a safety net in place. In some cases, policies will also cover incident response expenses, including legal services, reputation management, and mental and emotional pain diagnosed by a physician.

October is National Cybersecurity Awareness Month, (NCSAM), a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online. This year’s NCSAM will emphasize personal accountability and stress the importance of taking proactive steps to enhance cybersecurity at home and in the workplace. This year’s overarching message – Own IT. Secure IT. Protect IT. – will focus on key areas including citizen privacy, consumer devices, and ecommerce security.

 

Latest research and analysis