Triple-I study flags gaps in insurers’ cyber preparedness

New report reveals evolving cyber threats facing insurers

Triple-I study flags gaps in insurers’ cyber preparedness

Cyber

By Camille Joyce Lisay

There are a host of issues with how insurers approach cyber risk management.

That’s the verdict of a new report from the Insurance Information Institute (Triple-I) and cybersecurity firm Fenix24, which has identified key strengths and vulnerabilities in how insurers are managing cyber risk, as the industry faces increasingly complex and fast-evolving threats.

The report, Cybersecurity for Insurers: Squaring Safety with Service, examines internal cybersecurity practices across property/casualty insurers and finds that while firms have made significant investments in security controls, gaps remain in areas such as patch management, authentication methods, and recovery preparedness.

Insurers occupy a dual role in the cybersecurity landscape, acting both as underwriters of cyber risk and as organizations exposed to the same threats they assess. The report notes that this creates pressure for insurers to demonstrate robust internal practices that align with the standards they impose on policyholders.

Cyber risk continues to grow alongside the expansion of the cyber insurance market, which reached $15.3 billion in net premiums written in 2024 and is projected to increase to $16.3 billion in 2025. While ransomware remains a significant concern, it accounted for only 19% of cyber claims in 2023. By contrast, business email compromise and funds transfer fraud represented a majority of claims at 56%, highlighting a shift in threat patterns.

The report outlines several key findings:

  • Recovery preparedness gaps: Most insurers have implemented immutable backups and report meeting recovery time objectives for critical systems. However, testing is often conducted under ideal conditions rather than across full network recovery scenarios.
  • Authentication risks: While multi-factor authentication is widely adopted, some firms continue to rely on less secure methods such as SMS or email-based verification, which are vulnerable to exploitation.
  • Exposure through browsing practices: Controls such as DNS filtering are common, but practices like split tunnelling can increase exposure to phishing and malware risks.
  • Patching delays: Although all insurers conduct penetration testing, only about half apply security patches on a monthly basis, despite the rapid exploitation of new vulnerabilities.

The findings suggest that insurers are shifting focus from achieving perfect security to building resilience through preparation, testing, and continuous improvement.

The report emphasizes that effective cybersecurity strategies must balance protection with operational efficiency, particularly as insurers manage both internal systems and customer-facing services in an increasingly digital environment.

Related Stories

Keep up with the latest news and events

Join our mailing list, it’s free!