clearwatersecurity.com
Open in
urlscan Pro
2620:12a:8000::1
Public Scan
Submitted URL: https://go.clearwatersecurity.com/e3t/Ctc/5A+113/ckHKD04/MXdG9s4w4PqW4BVvNc5lkJsPW4KxtYX58rBrwN15bQW25kvg0W50kH_H6lZ3kqW90vkSG8bbc...
Effective URL: https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=e...
Submission: On January 19 via api from US — Scanned from DE
Effective URL: https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=e...
Submission: On January 19 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://clearwatersecurity.com/
<form role="search" method="get" class="et-search-form" action="https://clearwatersecurity.com/">
<input type="search" class="et-search-field" placeholder="Search …" value="" name="s" title="Search for:">
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/4be93bc2-0e8c-4e4b-915a-5dac5d057bb6
<form id="hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"
class="hs-form-private hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6 hs-form-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6 hs-form-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6_69de48c4-ceab-4bb3-9a8d-ce871a9ed6c5 hs-form stacked"
target="target_iframe_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" data-instance-id="69de48c4-ceab-4bb3-9a8d-ce871a9ed6c5" data-form-id="4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" data-portal-id="2783949"
data-test-id="hsForm_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Email" for="email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your First name"
for="firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>First name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="firstname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Last name" for="lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Last
name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="lastname" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" class="" placeholder="Enter your Company name" for="company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6"><span>Company
name</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" name="company" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy. </p>
</div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1705632435026","formDefinitionUpdatedAt":"1689342030535","lang":"en","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[3182929,1257793],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":3183534,\"label\":\"I agree to receive other communications from Clearwater Compliance.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"<p>Clearwater is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:</p>\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"<p>I agree to allow Clearwater to store and process my personal data.</p>\",\"privacyPolicyText\":\"<p>By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy.&nbsp;</p>\",\"isLegitimateInterest\":true}","embedType":"REGULAR","disableCookieSubmission":"true","clonedFromForm":"6dd1de4f-21fc-4047-b3e8-1de18058c63b","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36","pageTitle":"Protecting Healthcare with Cyber Defenses: The Essential Guide - Clearwater","pageUrl":"https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw&utm_content=290563300&utm_source=hs_email","urlParams":{"utm_medium":"email","_hsmi":"290563300","_hsenc":"p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw","utm_content":"290563300","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"53f96c60cd85e6e97e54ee2102ad8a20","__hsfp":3725600676,"__hssc":"185014134.1.1705632435228","__hstc":"185014134.53f96c60cd85e6e97e54ee2102ad8a20.1705632435228.1705632435228.1705632435228.1","formTarget":"#hbspt-form-69de48c4-ceab-4bb3-9a8d-ce871a9ed6c5","sfdcCampaignId":"701C0000000sX9FIAU","rumScriptExecuteTime":2572.3999996185303,"rumTotalRequestTime":2878.0999994277954,"rumTotalRenderTime":2886.199999809265,"rumServiceResponseTime":305.69999980926514,"rumFormRenderTime":8.100000381469727,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1705632435240,"originalEmbedContext":{"portalId":"2783949","formId":"4be93bc2-0e8c-4e4b-915a-5dac5d057bb6","region":"na1","target":"#hbspt-form-69de48c4-ceab-4bb3-9a8d-ce871a9ed6c5","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true,"sfdcCampaignId":"701C0000000sX9FIAU"},"correlationId":"69de48c4-ceab-4bb3-9a8d-ce871a9ed6c5","renderedFieldsIds":["email","firstname","lastname","company"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4529","sourceName":"forms-embed","sourceVersion":"1.4529","sourceVersionMajor":"1","sourceVersionMinor":"4529","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1705632435175,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Protecting Healthcare with Cyber Defenses: The Essential Guide - Clearwater\",\"pageUrl\":\"https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw&utm_content=290563300&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"290563300\",\"_hsenc\":\"p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw\",\"utm_content\":\"290563300\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1705632435176,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1705632435237,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"53f96c60cd85e6e97e54ee2102ad8a20\"}"}]}"><iframe
name="target_iframe_4be93bc2-0e8c-4e4b-915a-5dac5d057bb6" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/7ac86f62-e08c-402c-bace-dc5734256d95
<form id="hsForm_7ac86f62-e08c-402c-bace-dc5734256d95" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2783949/7ac86f62-e08c-402c-bace-dc5734256d95"
class="hs-form-private hsForm_7ac86f62-e08c-402c-bace-dc5734256d95 hs-form-7ac86f62-e08c-402c-bace-dc5734256d95 hs-form-7ac86f62-e08c-402c-bace-dc5734256d95_9dc09bec-131a-4e61-8050-3b703b1333bd hs-form stacked"
target="target_iframe_7ac86f62-e08c-402c-bace-dc5734256d95" data-instance-id="9dc09bec-131a-4e61-8050-3b703b1333bd" data-form-id="7ac86f62-e08c-402c-bace-dc5734256d95" data-portal-id="2783949"
data-test-id="hsForm_7ac86f62-e08c-402c-bace-dc5734256d95">
<fieldset class="form-columns-2">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your First Name"
for="firstname-7ac86f62-e08c-402c-bace-dc5734256d95"><span>First Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-7ac86f62-e08c-402c-bace-dc5734256d95" name="firstname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Last Name" for="lastname-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Last
Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-7ac86f62-e08c-402c-bace-dc5734256d95" name="lastname" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-2">
<div class="hs_company hs-company hs-fieldtype-text field hs-form-field"><label id="label-company-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Company Name"
for="company-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Company Name</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="company-7ac86f62-e08c-402c-bace-dc5734256d95" name="company" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization" value=""></div>
</div>
<div class="hs_jobtitle hs-jobtitle hs-fieldtype-text field hs-form-field"><label id="label-jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Job Title" for="jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Job
Title</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="jobtitle-7ac86f62-e08c-402c-bace-dc5734256d95" name="jobtitle" required="" placeholder="" type="text" class="hs-input" inputmode="text" autocomplete="organization-title" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-2">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Email" for="email-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Email</span><span
class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-7ac86f62-e08c-402c-bace-dc5734256d95" name="email" required="" placeholder="" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_phone hs-phone hs-fieldtype-phonenumber field hs-form-field"><label id="label-phone-7ac86f62-e08c-402c-bace-dc5734256d95" class="" placeholder="Enter your Phone Number" for="phone-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Phone
Number</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="phone-7ac86f62-e08c-402c-bace-dc5734256d95" name="phone" required="" placeholder="" type="tel" class="hs-input" inputmode="tel" autocomplete="tel" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_what_are_you_interested_in_discussing_ hs-what_are_you_interested_in_discussing_ hs-fieldtype-textarea field hs-form-field"><label id="label-what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95" class=""
placeholder="Enter your Please let us know a few details about what are you interested in discussing?" for="what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95"><span>Please let us know a few details about what are you
interested in discussing?</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><textarea id="what_are_you_interested_in_discussing_-7ac86f62-e08c-402c-bace-dc5734256d95" class="hs-input hs-fieldtype-textarea" name="what_are_you_interested_in_discussing_" placeholder=""></textarea></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_how_did_you_about_clearwater_ hs-how_did_you_about_clearwater_ hs-fieldtype-text field hs-form-field"><label id="label-how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95" class=""
placeholder="Enter your How did you about Clearwater?" for="how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95"><span>How did you about Clearwater?</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: block;">Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts. </legend>
<div class="input"><input id="how_did_you_about_clearwater_-7ac86f62-e08c-402c-bace-dc5734256d95" name="how_did_you_about_clearwater_" required="" placeholder="" type="text" class="hs-input" inputmode="text" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="legal-consent-container">
<div class="hs-richtext">
<p>By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s <strong><a href="https://clearwatercompliance.com/privacy-policy/">Privacy Policy</a></strong>.</p>
</div>
</div>
</fieldset>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1705632434982","formDefinitionUpdatedAt":"1704379658612","legalConsentOptions":"{\"legitimateInterestSubscriptionTypes\":[3182929,3183534],\"communicationConsentCheckboxes\":[{\"communicationTypeId\":3183534,\"label\":\"I agree to receive other communications from Clearwater Compliance.\",\"required\":false}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"communicationConsentText\":\"Clearwater Compliance is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below to say how you would like us to contact you:\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentText\":\"In order to provide you the content requested, we need to store and process your personal data. If you consent to us storing your personal data for this purpose, please tick the checkbox below.\",\"processingConsentCheckboxLabel\":\"I agree to allow Clearwater Compliance to store and process my personal data.\",\"privacyPolicyText\":\"<p>By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s <strong><a href=\\\"https://clearwatercompliance.com/privacy-policy/\\\">Privacy Policy</a></strong>.</p>\",\"isLegitimateInterest\":true}","clonedFromForm":"1ae9638e-a577-4ab3-bd78-8a73221aebad","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36","pageTitle":"Protecting Healthcare with Cyber Defenses: The Essential Guide - Clearwater","pageUrl":"https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw&utm_content=290563300&utm_source=hs_email","urlParams":{"utm_medium":"email","_hsmi":"290563300","_hsenc":"p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw","utm_content":"290563300","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"53f96c60cd85e6e97e54ee2102ad8a20","__hsfp":3725600676,"__hssc":"185014134.1.1705632435228","__hstc":"185014134.53f96c60cd85e6e97e54ee2102ad8a20.1705632435228.1705632435228.1705632435228.1","formTarget":"#hbspt-form-9dc09bec-131a-4e61-8050-3b703b1333bd","sfdcCampaignId":"7013c000000uC1HAAU","rumScriptExecuteTime":2588.800000190735,"rumTotalRequestTime":2750.5999994277954,"rumTotalRenderTime":2774.0999994277954,"rumServiceResponseTime":161.79999923706055,"rumFormRenderTime":23.5,"connectionType":"4g","firstContentfulPaint":0,"largestContentfulPaint":0,"locale":"en","timestamp":1705632435236,"originalEmbedContext":{"portalId":"2783949","formId":"7ac86f62-e08c-402c-bace-dc5734256d95","region":"na1","target":"#hbspt-form-9dc09bec-131a-4e61-8050-3b703b1333bd","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true,"sfdcCampaignId":"7013c000000uC1HAAU"},"correlationId":"9dc09bec-131a-4e61-8050-3b703b1333bd","renderedFieldsIds":["firstname","lastname","company","jobtitle","email","phone","what_are_you_interested_in_discussing_","how_did_you_about_clearwater_"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.4529","sourceName":"forms-embed","sourceVersion":"1.4529","sourceVersionMajor":"1","sourceVersionMinor":"4529","allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1705632435046,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Protecting Healthcare with Cyber Defenses: The Essential Guide - Clearwater\",\"pageUrl\":\"https://clearwatersecurity.com/blog/10-must-have-cyber-defenses-to-help-you-get-and-keep-cyber-insurance-coverage/?utm_medium=email&_hsmi=290563300&_hsenc=p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw&utm_content=290563300&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"290563300\",\"_hsenc\":\"p2ANqtz-9F_7HqyNetvwqR3g7hVKOHT5nhcqxcLaPpMkIAA-s7kKObTAs1fkFUrVInrGSSxFIiAeTondjy8BiPg5zC-ByQgbgIGrgPkyXhPaIgW4wskdQFYgw\",\"utm_content\":\"290563300\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1705632435048,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1705632435232,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"53f96c60cd85e6e97e54ee2102ad8a20\"}"}]}"><iframe
name="target_iframe_7ac86f62-e08c-402c-bace-dc5734256d95" style="display: none;"></iframe>
</form>
Text Content
× This site uses cookies to provide you with a more personalized experience and to improve our website. By using our website you agree to our use of cookies in accordance with our updated Privacy Policy I Agree Decline * Managed Services * ClearAdvantage® Program * ClearConfidence™ Program * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Transformation * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Healthcare Business Service Providers * Health Plans * Healthcare Attorneys * Healthcare Investors * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Resources * Blog * Webinars & Events * Case Studies * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * Contact Select Page * Managed Services * ClearAdvantage® Program * ClearConfidence™ Program * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Transformation * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Healthcare Business Service Providers * Health Plans * Healthcare Attorneys * Healthcare Investors * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Resources * Blog * Webinars & Events * Case Studies * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * Contact Blog 10 MUST-HAVE CYBER DEFENSES TO HELP YOU GET—AND KEEP—CYBER INSURANCE COVERAGE Driven largely by an ongoing increase in ransomware attacks and payouts, cyber insurance carriers today require more stringent controls to get—and keep—coverage. What was once just a few questions are now applications and questionnaires that span many pages. And, today’s cyber insurance providers won’t just take your word that you’ve implemented mature cyber hygiene practices. They want you to demonstrate and document what you’re doing alongside ongoing validation processes. One small misstep or inaccuracy could mean your coverage won’t pay out when you need it most. The reality is that while many healthcare organizations know they must meet HIPAA privacy and security requirements, most struggle with understanding which—and how many—cybersecurity controls and frameworks are reasonable and appropriate for their organizations. Fewer have robust risk analysis and risk management programs, and most can’t fine-tune their cyber programs at an individual control level. When your organization doesn’t have comprehensive visibility into your cybersecurity practices, completing a cyber insurance application is a nightmare. The good news is this process doesn’t have to be that complicated. With a good understanding of what’s happening in the market and industry-recognized best practices, you can build confidence to obtain—and maintain—cyber insurance coverage for when you need it most. THE RANSOMWARE RISE Just a few years ago, healthcare organizations could easily get insurance with limited underwriting information. Carriers wanted to build their books, and cyber insurance premiums were affordable. But that began to change in 2020 with the rise of ransomware attacks and increased ransomware payouts and claims. Historically, ransom payments were in the tens of thousands of dollars, with the occasional payout exceeding $100,000. Yet, it didn’t take long for threat actors to realize they could further monetize their criminal activity by launching more widespread ransomware attacks. In Q1 2020, for example, ransomware claims were about $60 million but had nearly doubled by year’s end. Claims continued to increase into 2021, with Q2 claims reaching nearly $190 million. As payouts and claims increased, carriers looked for corrective actions, for example, they started to sublimate coverages like cyber extortion. Ransomware coverage changed, and in some cases was completely excluded from policies. Healthcare organizations started to take note too, especially as they experienced their own breaches and felt vulnerable to future attacks. They responded by beefing up their cybersecurity programs and increasing ransomware awareness. By early 2022, there seemed to be a payoff for all the hard work with the 2023 Coalition Cyber Claims Report revealing ransomware claims had finally begun to slow, and along with it, the spike in cyber insurance premium rates. There was also, at last, more competition entering the cyber insurance marketplace, which helped to lower premiums. RANSOMWARE IS HERE TO STAY Moving into 2023, ransomware claims began trending upward again. Malwarebytes 2023 State of Ransomware Report found that by the end of 2022, the average number of ransomware attacks per month in the U.S. hovered around 100, but by May 2023, it doubled, hitting 212 known attacks that month. Zscaler’s 2023 ThreatLabz State of Ransomware report found that in 2023, ransomware attacks have increased by nearly 40%. The good news? As cyber insurance and other regulatory and compliance requirements get tougher, organizations are maturing their programs, and fewer are paying out ransom as they once did. Still, attack frequency and severity continue to increase as bad actors work to further monetize criminal activities and attacks get more complex. A ransomware attack a few years ago may have resulted in a hacker locking up an organization’s systems and data and then demanding a ransom for a decryption key to get it back. Today, in addition to taking data hostage, attackers also threaten to release sensitive and protected data onto the Dark Web, with skyrocketing ransom payouts. The Zscaler report found that the average enterprise ransom payment exceeds $100,000, with an average demand of more than $5.3 million. HEALTHCARE STILL IN ATTACKERS’ CROSSHAIRS Health systems report major upticks in their premiums and the number of cyberattacks wreaking havoc on the industry and claims activity is a major driver of increased cyber insurance rates. Attackers know healthcare data is valuable, so healthcare remains centered in their crosshairs. Not only are healthcare breaches increasing, but they’re exposing unprecedented numbers of records. So far in 2023, there have been nearly 90 million record exposures. In July 2023 alone, breaches exposed nearly 22 million. These numbers should be a wake-up call for healthcare organizations as the average cost of a healthcare data breach is nearly $11 million, making healthcare, once again, the most expensive of all industries in cost of a breach. If you’re a healthcare entity or a business associate that deals with healthcare-related data, expect to undergo additional scrutiny when looking for cyber insurance coverage. TOP 10 CONTROLS TO GET COVERAGE So, how can you ensure you’ve got everything in place before applying for cyber insurance? The following recommended list of 10 cybersecurity controls may help you get coverage and prove you were doing what you said you would do, should you have to file a claim. While each cyber insurance provider will have unique requirements (so be sure to read all the fine print in your policy), HUB International’s Senior Vice President, Technology & Cyber Leader Nate Hansen recently shared the following best practices on a Clearwater webinar as most cyber insurance carriers will require these : 1. Multi-factor authentication (MFA) for remote/email/privileged user/cloud access 2. Backups made offline from your main network 3. Endpoint detection and response (EDR) tools 4. Patch management procedures 5. Remote desktop protocol (RDP) management/vulnerability scanning. It’s important to note here that almost every carrier now utilizes some type of vulnerability scanning tool or process as part of their underwriting practices. They may use the results of those scans to determine if your organization is eligible for coverage. 6. Incident response and business continuity plans 7. Email security tools/privileged account tools (i.e. Privileged Access Management or PAM tooling) 8. Cybersecurity awareness training, for example, phishing and social engineering exercises 9. Internal and/or external 24×7 security operations center (SOC) 10. End-of-life software segmented from your main network As ransomware and other attacks become more complex, it becomes trickier to understand exactly what you may need from a coverage perspective and how that might apply to your organization. In addition to the controls listed above, it’s also important to stay up to date on emerging trends across the threat landscape. If you currently have coverage, don’t wait until your policy is about to expire before thinking about a renewal. Both your needs and your insurer’s coverage and claim requirements may have changed. To ensure you’re getting the best rates for the most reasonable and appropriate coverage for your organization, set aside a couple of months to shop around, have important conversations with potential insurers, and ensure you have everything in place—and that it’s documented and accurate—to complete the application process. If you’re new to this process or want to ensure you have industry-recognized controls that work as designed, consider partnering with a cybersecurity risk analysis professional who can help you take a more comprehensive look at your organization’s unique risks and offer advice and support on how to remediate them. With the help of a trusted partner, you can build confidence that you know what your risks are and you’re proactively mitigating them. View All Resources NEWSLETTER SIGN UP TO RECEIVE OUR MONTHLY NEWSLETTER FEATURING RESOURCES CURATED SPECIFICALLY TO YOUR CONCERNS. Email* First name Last name Company name By clicking the submit button I agree that I have read and agree to the terms of Clearwater's privacy policy. RELATED BLOGS THE PRIVACY IMPACT ASSESSMENT: IDENTIFYING AND MINIMIZING RISKS OF PII EXPOSURE Blog As regulators and consumers alike apply greater scrutiny to how patient data is being shared across the healthcare ... Read More A LOOK AT HITRUST VERSION 11: EVERYTHING YOU NEED TO KNOW Blog As organizations that are HITRUST certified, pursuing certification, or have been making plans to do so review the ... Read More ACTIVE INCIDENT RESPONSE PLANNING: FIND IT, FIX IT, AND GO FORWARD Blog As healthcare continues to top the list of industries targeted by cyberattacks—and has the highest cost of a ... Read More CONNECT WITH US First Name* Last Name* Company Name* Job Title* Email* Phone Number* Please let us know a few details about what are you interested in discussing? How did you about Clearwater?*Let us know who referred you, if you went to an event, found us in search, or liked one of our LinkedIn posts. By clicking the “Submit” button below, I agree that I have read and agree to the terms of Clearwater’s Privacy Policy. * Managed Services * ClearAdvantage® * ClearConfidence™ * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Management * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Health Plans * Healthcare Attorneys * Healthcare Investors * Healthcare Business Service Providers * Resources * Blog * Case Studies * Webinars & Events * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Contact * Managed Services * ClearAdvantage® * ClearConfidence™ * Managed Security Services * Patient Privacy Monitoring Services * Vendor Risk Management as a Service * Cybersecurity Assist Partner Program (CAPP) * Cybersecurity * Program Leadership & Management * OCR-Quality® Risk Analysis * OCR-Quality® Risk Response * Resiliency Services * Security Engineering * Technical Testing * NIST CSF Maturity Assessment * Vendor Risk Management * Cloud Security * Medical Device Security * 405(d) HICP Assessment * Security Controls Validation Assessment * Compliance * HIPAA * SOC 2 Readiness * HITRUST * Additional Privacy & Compliance Assessments * CMMC * IRM|Pro® Software * IRM|Analysis® * IRM|Privacy® * IRM|Security® * IRM|405(d) HICP™ * Who We Serve * Hospitals & Health Systems * Regional & Critical Access Hospitals * Physician Practice Management Groups * Digital Health * Medical Devices/MedTech * Health Plans * Healthcare Attorneys * Healthcare Investors * Healthcare Business Service Providers * Resources * Blog * Case Studies * Webinars & Events * On-Demand Webinars * White Papers * eBooks * Podcasts * Book: Stop the Cyber Bleeding * About Us * Company Overview * Leadership * Mission & Values * Careers * News * Contact Terms of Use | Privacy Policy ©2024 Clearwater Security & Compliance LLC