Why EDR is an essential requirement for cyber insurance
Cyber insurance helps cushion the financial impact of a data breach, but did you know that insurance carriers expect policy holders to meet them halfway? A company applying for a cyber insurance policy must demonstrate that it has effective cybersecurity policies and countermeasures in place. For example, many carriers require the applicant to prove that it is using an Endpoint Detection and Response (EDR) solution, before they will issue a policy.
Even when a company has a cyber insurance policy, its claims may still be denied if the carrier determines that it has not been diligent enough in risk mitigation, a problem known as “failure to maintain” an adequate security posture. This article explores why EDR is essential for getting cyber insurance and how the technology helps ensure that cyber insurance claims will not be rejected.
The increasing need for cyber insurance
Does a business need cyber insurance? The short answer is “yes,” because there’s a high likelihood that a company will experience an event where it will need the coverage. In contrast to car insurance, for example, where a policyholder might go for years without having an accident, in cyberspace, the accident is almost guaranteed to occur at some point in the near future.
Consider that data breaches are getting more common and expensive with every passing year. A study by the CyberEdge Group found that 85% of organizations experienced a successful cyberattack last year. They also discovered that 40% of organizations suffer more than six successful attacks a year.
Why is this happening? Risk factors like remote employees and distribution of digital assets across multiple cloud environments and third parties are increasing. According to IBM’s 2022 Cost of a Data Breach report:
Remote Work = More Risk, Higher Breach Costs
- The more employees you have working remotely the higher your data breach costs.
- When a remote worker is the cause of a data breach, the cost increases by $1 million.
- $9.44M is the average cost of a data breach in the United States, the highest of any country.
Cyber insurance can help pay for some of these costs.
How cyber insurance policies work
Cyber insurance policies vary in their specifics. And, the way each policy is written increases that variation. In general, however, cyber insurance functions much the same as other types of liability insurance. If the policy holder experiences a cyber attack and has what insurers call a “loss,” then the policy will pay on the claim, up to some agreed-upon limit.
For example, a cyber insurance policy might cover loss events like a data breach or an attack on policyholder data that’s hosted by vendors. The policy will pay for costs related to legal expenses, recovery and replacement of lost or stolen data, customer notification processes and call centers, lost income from business interruption, fees and fines and public relations. Some policies will cover the costs of ransomware extortion.
Why cyber insurance applications and claims get turned down
Insurance carriers are careful about whom they underwrite with cyber insurance. Just as the owner of an old car that lacks seatbelts will have trouble getting car insurance, so too will companies with deficient cybersecurity policies and controls struggle to get cyber insurance. Reasons for rejecting an application for coverage include a lack of preventative security measures, poor security training and awareness and inadequate endpoint security. Claims get turned down if the carrier determines that the policyholder has let its countermeasures lapse—a “failure to maintain” situation.
How endpoint security helps avoid breaches and claims
Cyber insurance carriers emphasize endpoint security, often requiring EDR, because almost all breaches begin at the endpoint. This should make intuitive sense, because the endpoint is where end users encounter potential malware—and where malicious actors can usually find a path into a target network. If endpoints are not well protected, the entire organization is exposed to risk of breach. Additionally, with today’s hybrid workforces or work-from-anywhere business models, the endpoint is considered the new network edge—meaning security protections must reach to every user and their devices.
What is EDR?
According to analysts at Nemertes, Endpoint Detection and Response (EDR) solutions use the enterprise endpoint as a cybersecurity sensor for detecting and helping respond to threats and security events. An EDR solution can incorporate traditional endpoint protection (EPP) functionality, such as antivirus, or it can stand alone.
EDR solutions are increasingly fitted into a broader environment of threat detection and response. Data from the endpoints is integrated into data streams from cloud service, CASB, SSO, and other network and security tools and services. This broader integration is aimed at powering cross-channel analytics with the goal of spotting behavioral anomalies and adaptive persistent threats; it is sometimes called Extended Detection and Response (XDR).
56% of organizations have begun to deploy EDR and another 24% intend to by the end of 2022. Combined EDR and Endpoint Protection Platforms are associated with an 82.5% reduction in serious security incidents.
Source: Nemertes, Secure Cloud Access and Policy Enforcement Research Study 2021
How EDR protects from cyber insurance denials
The insurance requirement to run EDR comes from a consensus that traditional, simpler countermeasures are no longer sufficient to block today’s sophisticated attack vectors. For example, standard signature-based antivirus technologies will miss threats that lack a known signature. This is a common scenario today. EDR may use artificial intelligence (AI) to detect anomalous behavior at the endpoint that suggests an attack is taking place, even if there is no known signature present.
After an EDR solution has detected an attack (the “D” in EDR), the “R” for response kicks in. EDR is able to facilitate an effective response to an attack. This reduces the overall cost of containing the breach and remediating the vulnerabilities that caused it.
For these reasons, cyber insurance carriers usually want to see EDR in place before they’ll issue a policy. The presence of EDR gives them some confidence that losses on the policy will be low in comparison to policies on companies that lack EDR. Having an actively functioning EDR solution in place also protects the policyholder from having a claim denied for a failure to maintain. The policyholder can say, in good faith, that they were being diligent in defending their endpoints.
Still, the best cyber insurance claim is the one never filed
Another compelling reason to consider EDR, even if one has cyber insurance, is that the best claim is often the one that never gets filed. Filing a cyber insurance claim means there’s been a breach. It’s far better to avoid being in that situation in the first place. Even though insurance covers some of the costs of dealing with a breach, it cannot make up for the disruption and loss of reputation that comes with a major breach. EDR helps prevent those outcomes.
Cyber insurance is an essential element of an effective risk management strategy. The policies cover some of the high costs of handling a cyberattack. Getting approved for a policy means demonstrating satisfactory security, however. In many cases, carriers require EDR, because endpoints are critical to defending digital assets and preventing breaches. With EDR in place, an insured organization can detect attacks and mount a robust response. Insurance carriers like that, so they are insisting that their policyholders adopt the technology.
Three tips for implementing endpoint security
Nemertes’ research shows about 47% of organizations using EDR report they also use a SASE (secure access security edge) solution. With the trend in consolidating network and security tools into unified approaches that make them easier to implement and manage, EDR can be an easy extension of other security investments and secure networking initiatives. For instance, Masergy’s SASE solutions come with an EDR add-on.
EDR technology features and management are also key considerations for successful deployment. Want a technology checklist of the automation and integration requirements necessary for advanced capabilities? Check out this informational graphic showing how to compare EDR solutions.
When it comes to management, EDR tools will increase the number of security alerts and events that IT staff will have to respond to. Even with automation, for now this means having a security operations center staffed with certified professionals monitoring events as they unfold—working around the clock to mitigate threats. EDR solutions can come with SOC services, which is often the best bet given today’s security staffing shortages.
Masergy helps companies build turnkey security protection spanning endpoints, multi-cloud environments, and the network. Plus, it’s all backed by 24/7 SOC services. When you need help expanding your security coverage, contact us for a free consultation.
Interested in how Managed Security can improve your business?
Call us now to arrange a consultation (866) 588-5885.
Or arrange for a consultation through our request form.
Three Considerations for Creating a Future-Ready Enterprise
Learn about what business leaders should do to create a technology-forward, future-ready enterprise.
Securing the Network Edge: Endpoint detection and response can reduce serious incidents by 50%
What is EDR and how is different from XDR? Masergy explains that and more.
Understanding ZTNA Relationship to Zero Trust and SASE
Zero Trust Network Access gets mixed up with Zero Trust and SASE. Understand the differences and how it strengthens security.
Cybersecurity Blind Spots: Why You’re Unaware of Risks Hiding in Your Own IT Environment
Companies today have more security weaknesses. Explore three common blindspots and how to turn on the light switch.
Delivering On The Digital-First Promise: How To Meet Heightened Demand With Less Risk
The best digital strategies foster an IT ecosystem where checks and balances allow emerging technologies to synthesize with security and the network.
Cloud Security Best Practices: Advice from Forrester
Security for cloud migration is the new imperative. Forrester’s best practices report includes these four key guidelines.
Rebalancing security and business innovation post-pandemic
The accelerated transformation has spurred new governance phases. Rebalance innovation and security by putting these checks and balances in place.
The Transformation Trifecta at the Heart of the Hybrid Work Revolution
How sustainable is your hybrid work strategy? It's time to unite the disciplines of connectivity, cybersecurity and collaboration.
Masergy Wins “Editor’s Choice MSSP of the Year” Global InfoSec Award During RSA Conference 2022
As a leading managed security services provider, Masergy earns one of Cyber Defense Magazine’s most prestigious awards. Here’s why.
The Comcast Business Story – An Overview
Comcast Business and Masergy have joined forces - We are your one provider for all your secure networking needs.
SEVEN leaders from Comcast Business and Masergy recognized on CRN’s 2022 Women of the Channel List!
Masergy Awarded 2022 TMCnet Remote Work Pioneer Award
Masergy succeeds in making remote work actually work well for IT teams in the long run.
Masergy: “multi-cloud environments make it difficult to control what’s happening in borderless networks”
Masergy's Trevor Parks talks to Cybernews about security threats in modern multi-cloud environments.
MSS, MDR, SOCaaS: The differences in security services and how to choose
The catalogue of security services abbreviations keeps getting longer. Here are some quick definitions and tips to help compare offerings.
Action plans for Log4j or Log4shell
The “Log4Shell" or “Log4j/Shell” vulnerability is one of the most serious cyber threats in recent history. Why is it such a serious concern and what can you do about it?
Meeting the moment for hybrid work cybersecurity
A growing number of cyberattacks and the explosion of hybrid work have pushed security resources to the brink, exposing the need for more managed services backed by machine learning.
Your security service provider needs an upgrade: RFP questions to find a true partner
How do you ensure you’re getting the right combination of security expertise and operational excellence all in one provider? These questions can help.