Page 39 - Info_Jan_2024
P. 39

Technology Update

Cyber Extortion                                      breach. The expenses to mitigate any negative        There exists a cyber-crime business model
                                                     publicity and cyber defamation due to the            called Ransomware as a Service where malicious
Payment of extortion money is not generally          security incident are also often covered by such     elements hire the services of operators who are
recommended in case of ransomware attacks.           policies.                                            technically skilled to develop malware and launch
However, recovering from such attacks may                                                                 ransomware attacks. State and non-State Hackers
sometime require payment of ransom. Cyber            Notification Expenses                                as well as Hacktivists form another major source
insurance provides compensation of expenses                                                               of cyber-attacks which jeopardizes the services
towards payments to extortionists who encrypted      This includes the costs of notifying third parties   of any business house. Corporate espionage and
the data and/or threaten to disclose sensitive       potentially affected by a security breach. This      malicious stakeholders (such as vendors in supply
information. The cost of hiring the services of a    often deserves importance considering the vast       chain) are also serious cause of concern for many
professional negotiator is also covered under        extend and strategic nature of the clientele of the  organisations. Proper risk assessments and
such insurance policies.                             affected organisation.                               contractual agreements will enable businesses to
                                                                                                          function in a realistic environment.
Business Interruption                                Privacy Liability
                                                                                                          Side Benefits
Loss of income due to actual or potential            Cyber insurance policies provide indemnity
impairment or denial of operations in the            against third-party damages that result from the        Cyber Risk Insurance has a couple of side
aftermath of cyber-attacks is a major concern for    disclosure of confidential information handled       benefits as well. A comprehensive security audit
many business establishments. Cyber insurance        by the insured. This also includes coverage          of the digital assets is one of the pre-requisite for
covers the loss of income as well as the extra       for vicarious liability where a vendor loses         the candidate organisations to avail the coverage
expenses incurred during the recovery period.        information the insured had entrusted to them.       of the risk insurance. This effort will help the
                                                                                                          entities to determine the existing vulnerabilities
Response Cost                                        System Liability                                     and to undertake necessary remedial measures
                                                                                                          to fix those vulnerabilities. This process in-turn
Businesses sometimes find it difficult to cop-       Damages that result from the failure to protect      improves the security posture of the organisation
up with the expenses for Forensic Investigation      the electronic data of a third party during a        and reduces the chances of security incidents.
to assess the spread and depth of the attack         cyber-attack is a major cause of concern for
following a security breach. As a result a           many organisations. Policies provide coverage for       A qualitatively superior and quantitatively
complete root cause analysis is often avoided        defense costs for which the insured is liable for    accurate assessment of risk is another
and the security holes are left unidentified         third-party damages.                                 prerequisite to arrive at the premium of cyber
and unattended. Cyber insurance comes to the                                                              risk insurance policies. This exercise distributes
aid of such organisations so that the chances        Access Liability                                     risks fairly among all the parties involved and
of recurrence of similar security incidents are                                                           avoids concentration of risk with any one of the
minimised.                                           Businesses often may have to compensate              stakeholders. This ultimately will put an end to
                                                     for denial of services to the clients in the         free-rides by some players and burden each one
Legal Recourse                                       wake of cyber-attacks. Insurance policies            with their share of risk. Ensuring security audit and
                                                     provide indemnity from claims resulting from         risk assessment, whenever the insurance policies
Cyber insurance policies provide reimbursement       unavailability of IT systems to such customers.      are renewed, will maintain the organisation in
of expenses towards legal advice and regulatory                                                           a healthy condition vis-a-vis cyber security and
compliance in the wake of a cyber incident. This     Source of Cyber Threats                              financial stakes.
includes cost of determining indemnification
obligations in the contracts of the organisations       Cyber threats can emanate from internal as well   Conclusion
with a third party. Policies also provide indemnity  as external source, and insurance policies usually
against violation of privacy laws caused by a        provide coverage for such threats irrespective of       With the increasing frequency of cyber-attacks,
security breach.                                     their source and cause. Ignorance and negligence     it’s more important than ever to have the right
                                                     of employees are the most common cause of            people, policies and technologies in place to
Public Relation                                      internal threats. Lack of awareness and training     protect organization’s sensitive information and
                                                     among employees causes improper handling of          assets. It is increasingly becoming important
Media handling is a vital activity in management                                                          to establish a backup mechanism to shoulder
of any crisis. Cyber insurance policies can be       systems which may ultimately pave way to cyber-      the financial burdens of any such attacks. Like
customized to include the cost of handling           attacks. Negligence among employees may lead to      any other insurance product, consumers feel
reputation attacks in the event of a security        serious security issues such as misconfiguration     the premium spent on cyber insurance policies
                                                     of systems and loss of credentials and even the      as a wasteful expenditure until they once claim
                                                     devices. Malicious and disgruntled employees are     the benefits of the same. While every endeavor
                                                     another common cause for internal threats which      may be made to secure one’s data by deploying
                                                     may lead to loss of data and denial of services.     appropriate cyber security solutions, the benefit
                                                                                                          of an insurance policy that provides coverage for
                                                        Ransomware attacks are the prominent form of      financial liabilities arising from cyber incidents
                                                     external threats covered under cyber insurance.      also may be simultaneously ensured for a healthy
                                                                                                          and peaceful business atmosphere.

                                                                                                           Contact for more details

                                                                                                          C.J. Antony
                                                                                                          Deputy Director General & SIO
                                                                                                          NIC Tamil Nadu State Centre
                                                                                                          E-2-A, Rajaji Bhavan, Besant Nagar, Chennai - 600090
                                                                                                          Email: antony@nic.in, Phone: 044-2490 8001

                                                                                                          January 2024 informatics.nic.in 39
   34   35   36   37   38   39   40   41   42   43   44