Mitigation Can Cut Malware Risk by Up to 80%, Say Experts

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 16, 2025
2 min read

Malware and Cloud Outages: Insurance Industry Insights

Malware Threats

A recent study conducted by CyberCube and Munich Re highlights that a widespread malware outbreak remains a critical threat to insurers. According to the survey, a global malware attack affecting 10% of systems would be considered "surprising," while a 25% infection rate would be "shocking." Respondents noted that an event similar to WannaCry or NotPetya, which impacted only around 0.5% of global machines, is not outside the realm of possibility.

The report emphasizes that patch management, network segmentation, and up-to-date data backups can reduce the likelihood and financial impact of such malware events by 50% to 80%. The survey found that software vulnerabilities and supply chain updates are likely drivers of malware outbreaks.

Ransomware

Image courtesy of Reinsurance Business

For further insights, refer to the full report published by TradingView News.

Cloud Outage Risks

The dependency on cloud services is growing, particularly among small and mid-sized firms. The survey indicates that outages lasting up to 72 hours are possible, while longer disruptions are considered "rare but possible." A one-day outage of a critical cloud service provider could lead to financial losses equivalent to 1% of annual revenue. If a cloud outage lasts for five days, losses could increase by at least a factor of 7.

The study revealed that establishing a multi-region architecture with cloud service providers (CSPs) is the most effective mitigation strategy against cloud outages. Using multiple CSPs for critical applications was deemed impractical due to the challenges of transferring services during an outage.

Cloud Services

Image courtesy of TradingView News

For more details, visit InsuranceERM and Reinsurance News.

Emerging Risks

Cybersecurity experts express concern about the impact of emerging technologies on the threat landscape. Industrial and consumer IoT devices are immediate areas of concern, while Large Language Models (LLMs) are currently relevant, and Artificial General Intelligence (AGI) is expected to pose risks in the coming years.

The study aims to improve understanding of extreme malware and cloud events and their mitigation effectiveness. Jon Laux from CyberCube stated, “By sharing the findings of our study on systemic cyber risks, we aim to provide a more nuanced view of how systemic cyber events might unfold and the factors that drive wide variation in risk exposure across firms.”

Emerging Technologies

Image courtesy of CyberCube

For further reading on systemic cyber risks, see Munich Re and CyberCube.

Explore how our services can help you mitigate these risks effectively. Contact us at [Company Name] or visit us at [Company URL] for more information.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article