Blog

MS&H Blog

Held Hostage: Is Your Business Information At Risk For Ransom?

Ransom Hands Tied Photo

The article found below from our partner, Domain Computer Services, points out many proactive steps you can take to help limit your exposure to falling victim to Ransomware. The best results I have seen come when a business works with an IT Security Company like Domain to perform ethical hacking and spear phishing attacks on their directors, officers, employees, and volunteers. The training that follows teaches everyone in the organization how to spot a spear phishing attack by specifically looking at e-mail addresses, attachments, and links before clicking and/or viewing. If the individual does click on a compromised link or attachment an encryption program begins to run and an on-screen message will give instructions on how to pay the ransom.

However, mistakes do happen and human error is one of the top causes of breaches. So how do we cover the liability associated with this mistake, and will your cyber insurance policy reimburse the ransom?

Yes – most carriers will cover this exposure under a First Party coverage part called Cyber Extortion. Most carriers will ask that you notify them of the incident and receive their written approval before releasing funds. The carrier will then reimburse you for the funds paid in excess of your retention. It is very important to read the insuring agreement and definition of the terms in the policy to understand how the policy will respond.

By now, you have probably heard from someone you know about this type of event happening to them or someone close to them. Every day I learn of a new event that has caused a lot of damage due to these types of Ransomware programs. Please also note that these types of computer programs are only going to evolve and become more damaging. This has already been seen in a program called Jigsaw.

To limit your exposure and damages it is very important to have a team behind you that you can count on to constantly stay on top of this ongoing risk. I have led the development at Meeker Sharkey & Hurley to provide our clients with the ability to make one phone call and be connected with an IT Security Firm, Law Firm, and your insurance carrier. If you have any questions please feel free to reach out to me directly and follow me on LinkedIn to stay up to date: www.linkedin.com/in/anthonydegraw

Click here to read “Held Hostage:  Is Your Business Information At Risk for Ransom?”.

Related Articles

RS MSH logo

Risk Strategies Acquires Meeker Sharkey & Hurley, Inc.

Expanding retail insurance operations in New Jersey BOSTON, December 8, 2021 — Risk Strategies, a leading national specialty insurance brokerage and risk management firm, today …

Read More >
shutterstock 1204727542

Financial Institutions – Top Risk Concerns for 2021

Source:  Insurance Thought Leadership Financial institutions and their directors have to navigate a rapidly changing world, marked by new and emerging risks driven by cyber …

Read More >
Cranford, NJ, USA April 15 The suburban town of Cranford, New Jersey in inundated with severe flooding following heavy rains

Flood Safety Tips

Each year, more deaths occur because of flooding than any other hazard related to thunderstorms. The most common flood deaths occur when a vehicle is …

Read More >