Implementing an effective cyber risk management program always starts with a comprehensive understanding of your environment, with insight into security gaps specific to the organization.

Author: John Farley

null

Those who manage risk in senior living environments have traditionally focused on perils associated with the physical safety of residents, professional errors and omissions, contractual liability and other forms of risk. However, a comprehensive enterprise risk management approach that reflects today's changing risk landscape calls for a reassessment of what is now impacting bottom lines, brand reputations and most importantly patient safety. Cyber risk has emerged as one such threat that cuts across all sectors and poses a very real threat to senior living organizations.

Today's cyber threat actors favor multiple attack strategies. Ransomware has emerged as the attack method of choice, where malicious software is launched via phishing emails. Once inside a network, the software often spreads quickly to lock down all data throughout the victim's entire ecosystem, impacting devices, servers, phones and many other integral parts of the organization — effectively ceasing operations.

Demands in the six and seven figures are often made in exchange for the release of data. Refusal to pay often results in threats to destroy data or release sensitive data to the public. Legal costs, business interruption, IT forensics investigation costs, regulatory fines and other costs may also follow.

To illustrate the bottom line impact of ransomware attacks, Coveware issued a recent report1 that found that the average ransom payment was $322,168. Even more concerning, business interruption costs could be even greater than the amount of the ransom paid, as the average downtime is 20 days. In a senior living environment, critical life-supporting medical devices and electronic medical record systems could become inaccessible. What might be an initial financial threat could quickly escalate to an inability to properly care for residents effectively, raising risks exponentially.

Ransomware attacks by industry. Corporation 40%, municipality 16%, education 13%, healthcare 13%, Infrastructure 11%, travel 4%, financial 3%
Source: Threat Spotlight Ransomware Trends2

Preventing and mitigating ransomware attacks

Implementing an effective cyber risk management program always starts with a comprehensive understanding of your environment, with insight into security gaps specific to the organization.

The FBI has offered advice on preventing and mitigating ransomware attacks, including:

  • Regularly back up data, air gap and password protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
  • Implement network segmentation.
  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the Cloud).
  • Install updates/patch operating systems, software, and firmware as soon as they are released.
  • Use multifactor authentication (MFA) with strong pass phrases where possible.
  • Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes. Avoid reusing passwords for multiple accounts.
  • Disable unused remote access and remote desktop protocol (RDPP ports and monitor remote access and RDP logs.
  • Audit user accounts with administrative privileges and configures access controls with the least privilege in mind.
  • Install and regularly update anti-virus and anti-malware software on all hosts.
  • Only use secure networks and avoid using public Wi-Fi networks. Consider installing and using a VPN.
  • Consider adding an email banner to messages coming from outside your organization.
  • Disable hyperlinks in received emails.
  • Focus on cybersecurity awareness and training. Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities (i.e., ransomware and phishing scams).

Transferring cyber risk

The cyber insurance marketplace offers solutions to transfer risks associated with ransomware and other cyber threats. Policy terms and conditions vary and can be negotiated. Most policies cover both first and third-party costs, and a select few may negotiate coverage to extend to bodily injury and property damage resulting from cyber attacks.

Those who seek comprehensive cyber insurance coverage need to be prepared for a market that is laser-focused on data security controls, with a particular focus on those designed to prevent ransomware attacks. Without these in place, applicants may be subject to higher insurance rates, reduced policy limits, greater retentions and policies that restrict coverage. There is also a distinct possibility that a cyber insurance underwriter will decline to offer terms at all if not satisfied that specific protections are in place.

Be prepared to answer questions about MFA, RDP, privileged access management, data backup practices, email hygiene, incident response planning and employee training. To that end, it's advisable to work closely with your cyber insurance broker before entering the cyber insurance market. Doing so may help you understand where your security controls may be lacking and can provide a roadmap to remediation. Ultimately, the goal will be to be viewed as a best-in-class risk by the underwriting community.

To learn more about cyber risks and protections, see our cyber reports and articles.

Author Information


Sources

1"Law Enforcement Pressure Forces Ransomware Groups to Refine Tactics in Q4 2021," Coveware, 3 Feb 2022.

2Shi, Fleming. "Threat Spotlight: Ransomware Trends," Barracuda, 12 Aug 2021.


Disclaimer

The information contained herein is offered as insurance Industry guidance and provided as an overview of current market risks and available coverages and is intended for discussion purposes only. This publication is not intended to offer legal advice or client-specific risk management advice. Any description of insurance coverages is not meant to interpret specific coverages that your company may already have in place or that may be generally available. General insurance descriptions contained herein do not include complete Insurance policy definitions, terms, and/or conditions, and should not be relied on for coverage interpretation. Actual insurance policies must always be consulted for full coverage details and analysis.

Gallagher publications may contain links to non-Gallagher websites that are created and controlled by other organizations. We claim no responsibility for the content of any linked website, or any link contained therein. The inclusion of any link does not imply endorsement by Gallagher, as we have no responsibility for information referenced in material owned and controlled by other parties. Gallagher strongly encourages you to review any separate terms of use and privacy policies governing use of these third party websites and resources.

Insurance brokerage and related services to be provided by Arthur J. Gallagher Risk Management Services, Inc. (License No. 0D69293) and/or its affiliate Arthur J. Gallagher & Co. Insurance Brokers of California, Inc. (License No. 0726293).