According to FBI data, cyber-criminals are on pace this year to collect approximately $1 billion through cyber extortion. This is a practice in which extortionists threaten to cripple a computer system or obtain and/or release confidential information unless their demands (usually for money) are satisfied. Although much of this money is coerced from individuals in increments of several hundred dollars, more and more organizations are finding themselves in cyber extortionists’ crosshairs, including documented incidents against local governments, schools, hospitals and businesses in a range of industries. As cyber extortionists increasingly target organizations rather than individuals, security professionals fear the costs of cyber extortion incidents could dramatically increase. Continue reading “The Ins and Outs of Cyber Extortion Insurance Coverage”
October was National Cyber Security Awareness month. The goal was to raise awareness about the importance of cybersecurity. That message was underscored on October 21, 2016, when attackers staged a massive cyberattack against Dyn, a company that provides services that help Internet users connect to Dyn’s customers’ websites. The attack on Dyn had the effect of disrupting access to major websites, such as Twitter, Netflix, and The New York Times, as well as perhaps lesser known but no less critical websites that many companies rely on for hosted services that they use to operate their businesses. Continue reading “How to Use the Attack on Dyn to Improve Your Companies’ Cyberinsurance”
The rising Pokémon Go sensation has dramatically increased the popularity of augmented reality games, but it has also brought with it increased risks and liabilities for both game users and developers alike. For those who don’t know, Pokémon Go is a mobile app that, although released just last month, has already been downloaded over 75 million times, generated more than $75 million in revenue, and boasts daily usage statistics that have exceeded Snapchat, Twitter, Instagram, and Facebook. It’s a location-based augmented reality game that allows users to partake in virtual scavenger hunts. Using the user’s GPS and mobile camera, players are encouraged to explore their surroundings, seek out animated characters in real world places, and “catch ‘em all.” The characters are overlaid on the player’s screen and displayed as if they exist in reality. Unfortunately, distracted players on the hunt can end up wandering (or driving) into places they shouldn’t be, and becoming injured or injuring others as a result.
The number of Pokémon Go calamities increases daily, with incidents ranging from the mundane to the absurd and dangerous. In the few short weeks since its debut, users have experienced or caused numerous personal injuries, property damage, and car accidents. Some users have become stuck in trees and locked in cemeteries, while more serious incidents involve users straying onto train tracks, falling off cliffs, or entering restricted nuclear power facilities—all while on the hunt for Pokémon characters. Still others in pursuit of Pokémon have trespassed on private property, and some users have even been robbed after being targeted and led to specific locations using the app. Continue reading “Insurance Liability, Risks, and Options in Augmented Reality: Catch ‘Em All”
Unmanned aerial vehicles, popularly known as drones, present enormous commercial potential for companies seeking to use this new technology to collect data. Drones are currently used for data collection in a number of fields. For example, farmers use drones to collect crop data, oil companies use drones to explore for oil and gas, surveyors use drones to create maps, and sports teams use drones to analyze practices. Numerous other industries will find uses for drones as regulatory barriers are relaxed.
Drones also present certain risks. Drones obviously pose the risk of colliding with objects and living things. Fortunately, the insurance industry has started to introduce specialized insurance coverage for these types of risks. And technological developments, such as sense-and-avoidance technology, promise to enhance drone safety. Continue reading “Do You Have Insurance for Drone Liabilities?”
A recent article in the Wall Street Journal highlights a widespread cybersecurity threat that it reports has generally gone unrecognized: the vulnerability to cyberattacks of the underlying control systems that power and cool data-center networks. These same types of systems, which include generators, thermostats, and air conditioners, are also found in commercial buildings and factories.
The article reports that a cyberattack involving control systems has the potential to take down an entire operation. It could also endanger human life. While these risks are not new, the article notes that security personnel at many companies do not realize that such systems may be connected to the computer system or the internet, and thus exposed to a cyberattack. In fact, the article reports, such systems often lack basic security protocols, such as user names or passwords. Continue reading “Does Your Company’s Cyber Risk Insurance Cover Cyber-Related Bodily Injury and Property Damage?”
Erin L. Webb
On August 28, 2014, I presented with insurance broker Sara Owens of GNW Evergreen, a division of HUB International, at PAX Dev in Seattle, Washington. PAX Dev is a conference devoted to the video game developer community and the topic of game making. Conference tracks focused on programming, design, business, art, music and more.
During our session, which was part of the business track, we talked about basic insurance concepts relevant to developers and publishers in the video game industry, including how to buy insurance and what to do in the event of a loss. Continue reading “PAX Dev: Insurance 101 for Video Game Developers and Publishers”
Erin L. Webb
More information has come to light about the data breach affecting Target, and it highlights the importance of “additional insured” coverage, as well as the need for companies to recognize that sophisticated cyberattacks can affect any company, not just those in the computer or technology industries. Blogger Brian Krebs reports that the theft of credentials from a heating and cooling (HVAC) company may be linked to the Target breach.
How could it happen? No details have yet been publicly confirmed, but it is possible that the HVAC company had access to Target’s network so that it could remotely monitor heating and cooling efficiency at multiple Target locations. If Target’s electronic systems were linked – if one was accessible via another – a path for a hacker from HVAC information to credit card processing may have been possible. Continue reading “Target Data Breach Part 2: The Additional Insured”