Page 34 - GS170502
P. 34

Education




        The MAC conference: Evolving                                               However, the potential inability to
                                                                                   provide  this  indemnification  could
        risks and insurance solutions                                              render such clauses as worthless as
                                                                                   the paper they are written on. If an
                                                                                   ISO contracts with a CRM, gateway or
        By Kevin Mendizabal                                                        any other provider, what assurances
                                                                                   does the ISO have that the provider is
        Frates Insurance and Risk Management                                       financially capable of indemnifying
                                                                                   not only that ISO, but also all other
                 he Merchant Acquirers' Committee held its annual show March 21 to   affected ISOs utilizing that provider?
                 23, 2017, in Las Vegas. Among the many topics discussed were risk,
                 underwriting, hacking and breaches, regulatory actions, and com-  In addition to contractual indemni-
        T pliance. A number of speeches focused on continuing and evolving         fication,  best practice requires evi-
        cyber-threats and the scope of cyber-liability for businesses operating within   dence  of  insurance  that  backs  this
        the payments industry. Discussions made it clear that payment companies are   indemnification, naming the indem-
        learning the hard way that data breaches encompass far more than credit card   nified party as an additional insured.
        data.                                                                      If a provider is unwilling to do this,
        Hacking and data breaches                                                  it would be prudent to find another
                                                                                   provider.  Accepting what  is  equiva-
        Companies such as acquiring banks, payment facilitators, gateways, ISOs and   lent to a parking garage liability dis-
        customer  relationship management (CRM)  specialists manage  their clients'   claimer is not by any means sound
        data. If they are compromised, all parties involved could suffer substantial   risk management.
        losses, experts at the conference noted. Because of this, indemnification provi-
        sions are typically included in contracts between two organizations, such as   Ransomware
        between a CRM and an ISO or between an acquiring bank and an ISO.          Speakers also pointed out that ran-
                                                                                   somware has been increasing  ex-
                                                                                   ponentially,  causing  companies  to
                                                                                   face losses in the hundreds of thou-
                                                                                   sands and even millions of dollars.
                                                                                   Ransomware gives hackers the op-
                                                                                   portunity to extort an organiza-
                                                                                   tion by holding its systems hostage.
                                                                                   Ransom demands are always paid in
                                                                                   bitcoin in exchange for passwords to
                                                                                   restore the compromised databases.

                                                                                   However, one has to ask if criminal
                                                                                   hackers will in fact keep their end of
                                                                                   the bargain. These bad actors have a
                                                                                   great reputation for customer service,
                                                                                   which is evident by the price of bit-
                                                                                   coin. Simple  supply and demand il-
                                                                                   lustrates just how in demand bitcoin
                                                                                   is. Bitcoin is primarily linked to the
                                                                                   rampant use of the digital currency to
                                                                                   pay said ransoms.

                                                                                   If that isn't scary enough, one of the
                                                                                   presenters at the conference demon-
                                                                                   strated how easy it is to bypass every
                                                                                   anti-virus and malware program de-
                                                                                   signed to prevent such attacks. Fortu-
                                                                                   nately, ransomware payments can be
                                                                                   covered by cyber insurance, provided
                                                                                   the policy is properly written. This is
                                                                                   one of the most important and com-
                                                                                   plex policies a company will main-
                                                                                   tain, and not all policies are created
                                                                                   equal, so it is critical to understand

        34
   29   30   31   32   33   34   35   36   37   38   39