Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

C2 provides technology services and consultation to businesses and individuals.

T (818) 584 6021
Email: [email protected]

C2 Technology Partners, Inc.
26500 Agoura Rd, Ste 102-576, Calabasas, CA 91302

Open in Google Maps
QUESTIONS? CALL: 818-584-6021
  • HOME
  • BLOG
  • SERVICES
    • Encryption
    • Backups
  • ABOUT
    • SMS Opt-In Form
    • Terms and Conditions
    • Privacy Policy
FREECONSULT
Tuesday, 01 June 2021 / Published in Woo on Tech

Cyber Insurance requirements forcing companies to adopt stricter security

With the recent ransomware attacks on large US companies like fuel distribution company Colonial Pipeline and now JBS, one of the world’s largest beef and pork suppliers, some of you might be thinking, “Oh good, they are focusing on the big fish now,” which gives us smaller companies a little breathing room. While this may make sense from purely predatory “Animal Kingdom” point of view, size matters naught on the internet. The difference in effort and cost to target a big company versus a small one isn’t large enough to deter them from pursuing both. In fact, due to the continually widening dark web market of Ransomware-as-a-Service (RaaS), targeting small companies is just as cost-effective as large ones. After all, 50 ransoms of $1000 is the same as one $50,000 score.

What does this mean for you?

Businesses large and small are starting to understand that it’s no longer “if” you will be attacked, but “when”, and in addition to tightening up their technology, they are also getting insurance to cover potential cyberattacks and ransomware demands, like the ones that Colonial faced (they paid, by the way) and what JBS is facing now. Because claims on these types of policies are on the rise and show no signs of slowing, the insurance providers are now asking for their potential cyber policy holders to batten down their hatches in preparation for the coming storm. Here are the things they are looking for:

  1. Does your company use two-factor authentication for all of its critical infrastructure? Not only email, but VPN/Remote access and administrator credentials for your company’s network as well.
  2. Is your company’s critical data backed up to an encrypted, offsite location that is protected by two-factor authentication?
  3. Are you running up to date malware protection on all devices that access company data and networks? The big gotcha here are all the personally-owned computers people have pressed into service during the pandemic.
  4. Are all devices that contain sensitive data encrypted? This includes mobile devices, and again, personally-owned equipment.
  5. Is your network protected by enterprise-grade firewalls and protocols?

Additionally, insurance providers might also be looking for these advanced security implementations that normally were only deployed by larger companies with dedicated technology and security staff, including:

  1. Dedicated network intrusion detection and active countermeasures.
  2. An information security policy in place for your company that governs how your company retains, protects and disposes of critical, confidential data.
  3. Regularly scheduled penetration testing of your company’s data networks.
  4. Regularly scheduled security audits of all company technology.
  5. Designated security officer/manager responsible for the company’s security.
  6. Regular training of all company staff on information security policy and practices.

When shopping for a cybersecurity policy, or expanding your current coverage to include it, you will be asked about some, if not all, of the above items, and your answers may determine the cost of your premium, or whether the insurance provider will underwrite you at all.

Image by Free stock photos from www.rupixen.com from Pixabay

  • Tweet
Tagged under: email, insurance, ransomware, security

What you can read next

Gmail envelope
Gmail change thwarts some image tracking
Hardware Failure
Hardware Failure – Are you ready?
No Phishing!
Chrome still tops for avoiding phishers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Closeup on phone with YouTube playing

    What We Can Learn About Business Continuity From the YouTube Outage

    YouTube being down is a minor inconvenience for...
  • Insurance Policy on table with technology around to depict cyber insurance

    Cyber Insurance Requirements for 2026: What Professional Services Firms Must Know

    In January 2026, a mid-sized accounting firm in...
  • Multi-Factor Authentication: The Security Measure Your Team Will Hate (But Needs)

    Look, I get it. Multi-factor authentication is ...
  • Business owner pressing an IT button with southern california in the background

    The Real Cost of Managed IT Services in Southern California (2026 Pricing Guide)

    Honest managed IT services in Southern Californ...
  • Person opening their email on a tablet

    Why Your Team Clicked That Phishing Email (And What It Really Means)

    I need to tell you something that might make yo...

Archives

  • GET SOCIAL
Get Tech Support Now - (818) 584-6021 - C2 Technology Partners, Inc.

© 2016 All rights reserved.

TOP