Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'Act of War' Clause Could Nix Cyber Insurance Payouts
Newest First  |  Oldest First  |  Threaded View
mcavanaugh1
50%
50%
mcavanaugh1,
User Rank: Moderator
10/29/2020 | 4:35:07 PM
Re: Well Written Article Explaining Insurance Coverage Evasions
This article is not about a Cyber Insurance policy that did not pay a claim. The focus is on the buyers that believe they can file a Cyber claim under another policy (mostly Property or Business Interruption) and be afforded coverage. It would be like filing a claim under your Homeowner's Insurance policy for damage to your car after a car accident. The insurance company is going to decline.

Many Insurance Agents & Brokers are not educated on why you should not expect coverage for a Cyber event under a Property policy.  They feel that servers & computers are considered property so any damage, regardless of the proximate cause, should be covered under the property policy. This is not going to be the case outside of specialized forms or those endorsed to provide affirmative coverage for Cyber events.

In reality, 90% of Cyber claims filed under standalone Cyber Insurance policies are covered by the carrier.  That is specific to standalone policies providing affirmative coverage as opposed to an endorsement on another policy.  You should absolutely work with an Agent or Broker that understands the coverage or make sure that they are working with a wholesaler or carrier that does.

Understanding the Cyber Insurance policy requires a knowledge of the exposure (not just the application) and the policy language which is not always the case for attorneys so the combination of an educated agent and an attorney is not a bad idea.  Also, if there are any questions and the attorney or agent cannot answer get on the phone with the underwriter who better be able to answer the questions.  If that is not possible you might want to try another carrier, agent, or broker.
Richard F.
50%
50%
Richard F.,
User Rank: Strategist
10/29/2020 | 2:01:50 PM
Well Written Article Explaining Insurance Coverage Evasions
This is a very useful and informative article explaining to the intelligent non-specialist one of the many evasions and traps used by some cyber insurance companies to avoid paying legitimate claims.

Unfortunately, many cyber insurance policies contain other layers of obnoxious surprises. Arbitration provisions, my area of expertise, and inclusion of "foreign" law are but a few of the many other devices also used by some insurance companies. 

Large companies can, and should negotiate EVERY component of coverage and EVERY endorsement excluding or limiting coverage.

 Smaller companies must rely on astute policyholder only insurance coverage attorneys.  Insurance brokers are important, but all purchasers have to remember that "their" insurance brokers must always maintain and preserve their relationships with the insurance companies to stay in business. Policyholder only insurance coverage attorneys can not, and do not, have those divided loyalties.  

It all can be summarized as "RFP." Read the Fine Print & Read the Full Policy!!  

Buyers beware!!!!

 

   


Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).