Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

5 minutes with Chris Hass: Why you shouldn't rely on cyber insurance

By Maria Henriquez
SEC_Web_5Minutes-Hass-1221_1170x658.jpg
November 24, 2021

Security talks to Chris Hass, former Department of Defense cybersecurity analyst, about why companies shouldn't rely on cyber insurance and what can be done to prepare instead. 



Security: What is your background and current role? What are some of the responsibilities in your role?


Hass: My background and experience span across both public and private sectors. Before joining Automox, I spent my time reverse-engineering malware and leading threat research teams at BlackBerry Cylance, built threat intel pipelines to track malicious actors at LogRhythm, and hacked on web applications for the National Security Agency.


Given those previous roles, I have an in-depth understanding of today’s threat landscape and like to constantly keep up with industry news and trends. As the Director of Information Security and Research at Automox, I lead all Security and IT operations, where we consistently embrace the convergence of the two. 


Security: In your experience, are companies relying on ransomware insurance instead of improving resilience to these types of attacks?


Hass: With the immense increase in attacks — including on major institutions such as the Colonial Pipeline — over the last year, many companies came to recognize the importance of improving their cyber hygiene to be more resilient and effective at preventing breaches. However, unfortunately, the majority still relies on expensive cyber insurance that may not even pay out in the end. While I can see why some companies would make this decision, especially in the SMB and startup industries where staffing a security team might not be possible, ransomware insurance on its own is not a productive approach to the cybersecurity challenges faced by almost every industry today. 


Security: Is ransomware insurance bad for cybersecurity? Should companies rely on this insurance? Why, or why not? 


Hass: Ransomware insurance is not necessarily bad, but there are hidden risks involved companies need to be aware of. For example, many carriers have a negligence or “failure to follow” exclusion in their policies, which means that they don’t cover claims if the company failed to maintain minimum or adequate security standards. Such an exclusion clause can state: “Failure to ensure that the computer system is reasonably protected by security practices and systems maintenance procedures that are equal or greater to those disclosed in the proposal.”


Cyber insurance is only a palliative approach and still leaves companies exposed to hackers. When you rely on ransomware policies to pay out, you even give in to bad actors, and they become more emboldened, putting a larger target on your back as a result.


Instead of relying solely on insurance, diversify your cybersecurity investments and secure your IT infrastructure to prevent attacks in the first place. First, invest in tools that allow you to proactively and efficiently harden your infrastructure, and second, consider insurance as a complementary strategy if it makes sense for your business.


Security: Should cyber/ransomware insurance be used as a component in a larger risk management strategy? If so, what should this strategy consist of? 


Hass: Strategies will vary based on your company, resources, and what you have in place today. Generally, not everyone needs ransomware insurance, and it should only serve as a component of larger risk management and cybersecurity strategy. Insurance can only help to offset the damages from a ransomware attack as it does not assist in identifying how a company was attacked or in removing the infection from your systems.


If you are already paying for cyber insurance, it is critical to complement it with tools and platforms that allow your IT and security teams to get ahead of hackers and respond to vulnerabilities in real time. 


Creating processes for patching vulnerabilities can lower the odds or prevent an attack from happening in the first place. Unpatched or misconfigured operating systems and software on an endpoint such as a server, computer, workstation, or mobile device are often the most exploited weaknesses in a cyberattack. We follow and recommend a 24/72 rule where zero-day vulnerabilities should be patched within 24 hours and critical vulnerabilities within 72 hours. Providing your teams with tools that can help automate these patch management tasks can help address critical high-risk vulnerabilities such as zero-day exploits immediately. By automating manual processes and tasks, IT teams can remediate vulnerabilities up to 30 times faster, more efficiently, and with higher accuracy.


Speed is one of your greatest competitive advantages in protecting against cyberattacks, but it can be difficult to achieve with the rise of distributed workforces. This makes cloud-native solutions increasingly important as it allows for better scalability for businesses of all sizes. Trading legacy, on-premises solutions for cloud-native automated ones will allow you to gain visibility to each remote device and minimize your organization’s risk and exposure, which ultimately delivers better security outcomes.


In addition to implementing the right tools and technologies, companies should also invest in training and educating employees on the best cybersecurity practices. Proper passwords, two-factor authentication and knowing how to recognize phishing attempts are essential to ensuring that cybercriminals do not exploit unprepared employees. 



KEYWORDS: cyber insurance cyber security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Man in mask by LED light

A Real-Life Horror Story: When AI Ghouls Move Faster Than Defenses Can React

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Email app

40B Records Exposed From Marketing and Email Data Platform

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 19, 2025

From Chaos to Clarity: How Real-Time, Location-Aware Intelligence Strengthens Security Programs

When disruptive events hit, security teams must move fast to protect people, executives, and assets. Every minute of delay can mean operational losses, safety risks, and reputational impact. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5 mins with Rachlin

    5 minutes with Seth Rachlin - SolarWinds, cyberattacks and cyber insurance

    See More
  • 5 minutes with Raj

    5 minutes with Satish Raj - Why AI will transform digital video surveillance in 2021

    See More
  • 5 mins with

    5 minutes with Michael Rezek - Ensuring holiday cyber-readiness

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing