"The scale and danger of the problem largely depend upon what we define as “cyber terrorism”; the phrase ‘one man’s cyber terrorist is another man’s hacktivist’ is just as valid an adage as its hackneyed forerunner.
(reproduced from Dark Reading) - Ericka Chickowski- Contributing Writer
Special insurance may offer value, but to get it you'll need to avoid common exclusions and stop trying to use a breach policy as a substitute for solid data security practices
As an increasing number of businesses are starting to look at cyber breach insurance as a tool to mitigate the risks of data breaches, IT security pros need to be prepared to help their organizations avoid the hazards of choosing a policy that may not pay out when the worst occurs.
Chief among the biggest pitfalls? Trying to use insurance as a financial replacement for investment in sound protection of databases and other data security infrastructure.