No insurance premiums saw greater growth in the second quarter of 2021 than those related to cybersecurity. According to the Council of Insurance Agents & Brokers, cyber insurance premiums grew more than a quarter (25.5%) during that period. That’s well above the 17.4% increase witnessed by umbrella insurance and an average of 8.3% growth across all premiums. In part, that’s because of ransomware. What can your business do about it?

What’s Behind This Growth of Cyber Insurance Premiums?

No other factor had as much of an impact on cyber insurance premiums for Q2 2021 as ransomware. Part of the reason for this has to do with the growth of ransomware attacks in recent months. According to ITProPortal, global ransomware volume reached 304.7 million attack attempts in the first half of 2021. That’s 0.1 million more attempted infections for all of 2020. Nearly two-thirds (64%) of those campaigns involved the Ryuk, Cerber or SamSam families, with government, education, health care and retail groups seeing triple-digit growth in the number of ransomware attacks that affected them during that period.

At the same time, ransomware costs have risen. In its Cost of a Data Breach Report 2021, for instance, IBM observed that ransomware attacks cost an average of $4.62 million. Those damages, which included escalation, notification, lost business and response (but not ransom payments), eclipsed the $4.24 million price tag for the average data breach.

Rising Ransomware Costs

Some factors drove these rising ransomware costs more than others. Remote and hybrid work stood out. In the words of Gallagher, “exploiting the remote workforce was the leading cause of ransomware claims during the pandemic.” That’s a problem, as remote and hybrid work isn’t going anywhere anytime soon. Forbes wrote that 70% of the workforce will be working remotely in some form by 2025, for example. Gartner noted that 74% of chief financial officers planned to permanently shift employees to remote work following the events of 2020.

So, victims turned to a cyber insurance provider to cover their ransomware costs in the age of hybrid and remote work. Beyond those damages, 64% of insurers said their clients relied on an insurer to help them pay following a ransomware attack. One client said that they witnessed “30+ [payouts] in the first half of the year alone”.

How to Prevent Ransomware

Many insurers don’t pay the full amount of a security incident. Therefore, cyber insurance payouts can help only so much. As I wrote before, cyber insurance could also be making ransomware worse. Hence the need to implement security best practices — especially when it comes to defending against ransomware.

First, think carefully about keeping legacy systems connected to your networks. If you don’t upgrade or replace them, your business or agency could be open to attack. Instead, implement compensating controls or preventative measures designed to limit access to them. Consider working with penetration tests to gauge the level of risk.

Second, achieve visibility over assets. Visualize those resources that store business-critical information. With that knowledge, security teams can prioritize those assets. That works better than trying to protect everything all at once.

Finally, organizations need to consider using threat intelligence to defend against emerging ransomware attacks. Security teams can use threat intelligence to monitor their network for Indicators of Compromise and other signs of attack. At the same time, they can use threat intelligence to educate their employees about evolving ransomware attacks. That training should include the channels on which they rely for distribution, extortion techniques and active campaigns to help them contribute to their employers’ security postures.

More from Incident Response

5 Golden Rules of Threat Hunting

When a breach is uncovered, the operational cadence includes threat detection, quarantine and termination. While all stages can occur within the first hour of discovery, in some cases, that's already too late.Security operations center (SOC) teams monitor and hunt new threats continuously. To ward off the most advanced threats, security teams proactively hunt for ones that evade the dashboards of their security solutions.However, advanced threat actors have learned to blend in with their target's environment, remaining unnoticed for prolonged periods. Based…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

People, Process and Technology: The Incident Response Trifecta

Let's say you are the CISO or IT security lead of your organization, and your incident response program needs an uplift. After making a compelling business case to management for investment, your budget has been approved and expanded. With your newfound wealth, you focus on acquiring technology that will improve your monitoring, detection and analysis of data traffic. Has the incident program really improved by the technology acquisition, or is the uplift merely cosmetic? If no other changes have been…

Self-Checkout This Discord C2

This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in Europe, IBM Security X-Force identified a novel technique employed by an attacker to introduce a command and control (C2) channel built upon Discord channel messages. Discord is a chat, voice, and video service enabling users to join and create communities associated with their interests. While Discord and its related software…