1. Business Ideas
  2. Business Plans
  3. Startup Basics
  4. Startup Funding
  5. Franchising
  6. Success Stories
  7. Entrepreneurs
  1. Sales & Marketing
  2. Finances
  3. Your Team
  4. Technology
  5. Social Media
  6. Security
  1. Get the Job
  2. Get Ahead
  3. Office Life
  4. Work-Life Balance
  5. Home Office
  1. Leadership
  2. Women in Business
  3. Managing
  4. Strategy
  5. Personal Growth
  1. HR Solutions
  2. Financial Solutions
  3. Marketing Solutions
  4. Security Solutions
  5. Retail Solutions
  6. SMB Solutions
Product and service reviews are conducted independently by our editorial team, but we sometimes make money when you click on links. Learn more.
Grow Your Business Security

Cyberattack Risks Remain a Threat to Businesses Despite Insurance

Cyberattack Risks Remain a Threat to Businesses Despite Insurance
Credit: Lagarto Film/Shutterstock

Any IT professional worth her or his salt will tell you it's not a question of if a cyberattack will target your business, but when. With so many threats floating around out there — malware, distributed denial of service, man-in-the-middle attacks — it pays to be prepared. But even robust preparation can't guarantee that your system won't be compromised, and the risk of a cyberattack is well beyond financial. Your brand's reputation and the privacy of your customers are at stake.

In this article ...

  1. What threats are out there?
  2. Mitigating the risk of a cyberattack
  3. Assigning the risk of a cyberattack

Business News Daily spoke with IT experts Senthil Rajamanickam, the FSI operations manager for data company Infogix, and Keith Barker, the founder of the "Certified Ethical Hacker" training course, about the growing reality of cyberattacks and how to mitigate the risks posed by malicious hackers.

Before you can begin to protect yourself, it's important to understand the threats that exist. Barker created his training course to do exactly that. Breaking down the basics of the most common techniques employed by hackers, the course is designed to help IT professionals anticipate and evade such attacks. By teaching about these threats from the ground up, Barker hopes to demonstrate to IT pros and entrepreneurs the nature of the myriad attacks that could be used against their systems.

"There are a lot of scary things in this course," Barker told Business News Daily. "The objective is shock, to wake people up to the kinds of things that are out there."

Two of the largest threats facing businesses, he said, are people being tricked into unwittingly opening the door for a malicious attack, and malware, which is any form of hostile or intrusive software that seeks to leverage your system for a nefarious purpose. In addition to those common attacks, Barker included distributed denial of service attacks, which flood a server with requests to overload it and temporarily shut down the system, and hijacking, or redirecting traffic by altering a system's DNS servers.

Still, that hardly scratches the surface of what's out there, and for a small IT team with a heavy workload, some of these threats can be easily overlooked, he said.

"Especially for a small business that doesn't have a huge IT staff or any specialists, one- or two-people teams are perhaps so busy they might not have time to step back and say, 'OK, what are we forgetting here?'" Barker said.

Once you've identified some of the most likely threats, you can mitigate the risks to your systems. Large companies heavily divert resources to this kind of protection and risk analysis, but small businesses are often unable to do so, Barker said.

"Huge companies spend millions and millions of dollars on [cybersecurity]," he said. "Small companies might just spend the money [necessary] to keep their systems functional."

But by identifying the biggest risks to your business and insulating them as much as possible, he said, you can help reduce the likelihood of an attack causing immense damage to your assets and reputation.

"If one server means a lot for revenue or the company, for example, that's a great server to help protect," Barker said. "You might move it to the cloud and use cloud security, which really just means someone else is doing it for you. That's why so many small companies are using cloud services, because they can be compliant with all these check boxes they need without internal staff."

Rajamanickam said small businesses can also institute a series of measures like firewalls, scans for threats and setting up the router process to make attacks more difficult. Unfortunately, he added, "there's not really much else you can do."

"Something like what happened to Home Depot or Target … these types of attacks are going to be there and [be] difficult to prevent," Rajamanickam said. "Federal regulators are encouraging information-sharing on cyberattacks, which will help [businesses] be ready for these attacks, but it still won't prevent it."

The uncomfortable knowledge that an attack can still get through despite preventative measures might leave you feeling uneasy. The rise of cybersecurity insurance is a response to exactly that concern.

"Cyberattacks really pose a big challenge for [businesses] to offset that type of risk," Rajamanickam said. "The natural thing to do is to go and look at cybersecurity insurance. It's not going to completely remove the risk, but it will transfer some of the risk to the insurance company."

However, even cybersecurity insurance is extremely limited, and only a fraction of the real risk can be shifted off your books, because there's no reliable method to quantify the risks. After all, what is the total sum of your business's data actually worth? The biggest cybersecurity insurers still don't have access to all the information they require to confidently accept larger portions of cyber-related risks. Without really knowing what risk they're accepting, the insurance companies could be opening themselves up to massive losses, and so they remain hesitant to accept more risks.

"There is no way for you to monetize the data you hold into a dollar value. It's still simply not there," Rajamanickam said. For example, "Uber could potentially be a market cap of multiple billions of dollars very quickly, but the maximum underwriting only protects hundreds of millions [of dollars' worth] of the data. An attack could cause much more damage than what insurance could cover.

"Most insurance companies are focused on helping you redo your network [and] replace or upgrade hardware, and so it's limited," he added.

Rajamanickam described the rise of a new industry known as "infonomics," which treats data as an asset and determines how best to assign a dollar value to it. As that industry grows, he said, the insurance companies might have a more reliable way to contemplate the risk of cyberattacks. But until then, businesses will remain open to at least a significant portion of the risk, he said.

"They're trying to help businesses figure out what could be the dollar value for the data, which the cybersecurity insurance industry could use to better underwrite the insurance risk," he said. "But the insurance body for cybersecurity is still a work in progress."

Adam C. Uzialko

Adam received his Bachelor's degree in Political Science and Journalism & Media Studies at Rutgers University. He worked for a local newspaper and freelanced for several publications after graduating college. He can be reached by email, or follow him on Twitter.