Insurance Premiums Data Leak because of Cyber Attacks

Australian organizations have been hit hard with the expense of data leak of premium up to 30 percent to cover cyber-attacks, as reported by insurance brokers Marsh.

 

This is increasing rapidly in the country because insurers are not spending on the IT services for covering such costly cyber and ransomware attacks, in which hackers demand payment and hostage the data until they get the amount they are asking for, and also leaks valuable information all over the internet.

 

Marsh’s head of global placement for the Asia-Pacific region John Donnelly said “There is just an increasing number of ransomware attacks, The losses … are significant.”

 

Many organizations are affected by cyber-attacks including Nine Entertainment, publisher of the Australian Financial Review, and logistics outfit Toll. The toll was under a cyberattack which seemed like the Ransomware Attack but no demands were made to Nine.

 

Marsh noticed that organizations that renewed their yearly insurance in the first quarter of 2021 had a 35% chance to deal with cyber-attacks in the United States, “double the increase seen in the prior quarter and the largest increase since 2015”. In Britain, it was 29%.

 

Mr. Donnelly discussed a fear for insurers and stated that unlike geographically restricted events e.g., cyclone hitting North Queensland, a cyber-attack could strike across a company’s systems. “It has the potential to be global,”..

 

As part of the Australian Govt. Stay Smart Online partner, Computer Support Professionals can also measure the security health of your business with the latest industry best tools and application. We can help you to protect your business from the latest threat which can cause a security risk and damage your identity.

WHAT WE COVER UNDER IT SECURITY:

  • Managed security services and solutions
  • Design security solution as per business needs
  • Cybersecurity awareness programs
  • Anti-Virus and Anti-ransomware solutions
  • Enterprise and SMB risk and IT compliance strategies
  • Security risk assessment
  • Identity and access management
  • Security audit and Incident investigation

Article courtesy: financial review

 

 

Leave a Reply