Major data breaches at companies of all size are telling us one thing—that businesses are struggling to deal with the challenges of data protection. Sophisticated cyber attacks are on the rise and the simple truth is that many companies aren’t prepared. Whether you’re talking about upgrading security appliances, running penetration tests or adding staff, data protection costs money. But these days companies are finding themselves increasingly squeezed by skyrocketing cyber insurance premiums and deductibles.
How can you protect your data if you can’t afford to do what’s necessary? Learn the benefits of a cyber insurance plan and what is critical to have in your next policy.
When you get into a car accident, who do you call? Among other people, your auto insurance agent must be near the top of the list. Even if you never get into trouble, there’s already a set premium you pay and deductible you’ll be required to pay. Policies are based on the amount of risk you as a crazy or steady driver represent to the insurance agent. As you get into more accidents, the risk rises and so does your premium.
Cyber insurance is no different!
For cyber insurers, offering breach coverage plans is a lot like gambling. There is a calculated risk involved and you have to pay to mitigate it. With data breaches happening in massive numbers, the risk is higher than ever and insurers are setting premiums and deductibles accordingly as a result.
Unfortunately, cyber insurance costs are getting so high that deploying a top-of-the-line security system while trying to pay for cyber insurance is enough to put many companies out of business. According to Tom Reagan of the Marsh & McLennan insurance company, “some companies are struggling to find the money to buy the coverage they want.”
Consider the recent Anthem data breach. The healthcare insurer’s cyber insurance renewal rates have been characterized as prohibitively expensive. They were covered for $100 million throughout the data breach recover process—but only after paying a $25 million deductible. Would your company be able to afford such a hit?
There’s only one way to have even a chance of affording cyber insurance—and it’s a bit of a Catch-22. The only way to reduce your premium and deductible is to reduce your risk by proving you’re equipped to ward off malicious hackers. Are we saying you have to spend money on cyber security to avoid paying so much for cyber insurance? Not if you know what you need for data protection.
Here’s your cheat sheet of critical data protection needs that will prove to insurers that you aren’t a major risk—resulting in significantly lower insurance costs:
Is all of this hacking and these large-scale data breaches just a passing fad? Definitely not. The rise in cyber crime will drive the cyber insurance market to over $7 billion in the coming years and insurers will be increasingly wary of ill-prepared companies. It’s time to get your security systems and strategies in check.
Even a small breach can result in crippling damages and fines. It’s time every company take cyber crime seriously, educate their departments and employees and set themselves up for favorable cyber insurance costs.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.