• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Cyber Insurance Gap May Leave Merck Hanging After NotPetya

Merck NotPetya Cyber Security Insurance

During the summer of 2017, pharmaceutical giant Merck was one of countless companies, around the world hit by the most devastating cyber-attack in history: NotPetya. Initially masquerading as ransomware, NotPetya turned out to be far worse: a strain of malware designed to destroy systems rather than hold them hostage. The toll NotPetya inflicted on Merck was devastating. As many as 30,000 laptops and desktops were taken off line as were 7,500 servers. One employee estimated losing 15 years of work as a result of the attack. Another estimated that, for two weeks, operations completely stopped as cleanup efforts raced on.

Merck totaled up the costs connected to NotPetya to $1.3 billion – an astronomical amount, but at least the company had a sizeable cyber security insurance plan to fall back on. Its insurers, however, saw things differently. Many of its insurers rejected Merck’s claims on the grounds that the cyber-attack wasn’t covered after all. Their reason? The insurers claimed NotPetya was an act of war and thus outside the scope of Merck’s coverage.  

GRU, Russian’s military intelligence agency, was credited with unleashing NotPetya as yet another weapon in that country’s ongoing conflict with Ukraine. The malware nearly decimated Ukraine’s technological infrastructure, wiping out an estimated 10% of computers across the entire country. Insurers believe organizations like Merck – which saw NotPetya enter its system through a server in the company’s Ukraine branch – as simply getting caught in the crossfire.  

Merck has taken its case to court but may be in for an uphill fight. The White House has publicly linked NotPetya directly to Russia’s destabilization efforts in Ukraine, potentially putting insurers on solid legal ground and leaving Merck – and others in the same boat – hanging. 

What to consider before buying cyber insurance

Analysts have great expectations for the cyber security insurance industry over the coming years, although they can’t quite agree on just how great. In a recent story, Tech Republic quoted research that predicts gross written premiums for cyber security insurance totaling just under $8 billion by 2020. Elsewhere on the Internet, Adroit Market Research claims premiums will total $23 billion by 2025. How much or how quickly the industry is going to grow is beside the point, which is that – given the omnipresence of cyber security incidents – it will grow. As more organizations invest in cyber security insurance, here are a few things to remember when trying to pick the right plan.

  • Cyber security insurance shouldn’t replace cyber security solutions. Preventing attacks is always the best policy even with a safety net like insurance in place. Insurance, after all, can’t repair the reputational damage incurred during a data breach. Furthermore, insurers will likely take a hard look at an organization’s cyber security posture following an attack in search of weak points that might allow them to avoid paying up.            
  • Get perspectives from outside IT. Cyber security isn’t an IT-only concern and the same goes for cyber security insurance. For example, Legal might be able to red flag coverage gaps – like, potentially, an “act of war” exemption. Other teams can spot other shortfalls specific to their areas that could prevent an organization from receiving the insurance benefits it needs, when it needs them most.  
  • Put together a checklist of ‘must-haves’. The ideal policy is going to vary from company to company. However, the Delaware Business Times shared a list of core items that the majority of those in the market for cyber security insurance will want. This includes covering internal and external loses and costs associated with: legal representation, forensic investigation, PR, business disruption, “make-good” services like credit monitoring, and regulatory fines.  
  • Decide how much coverage is needed. It seems that organizations increasingly don’t want to get stuck without cyber insurance. They also don’t want to get stuck paying for more coverage than they will need. It’s a balancing act, one that can be achieved through internal risk assessments as well as by enlisting the help of outsiders with experience in the field.  

Next Steps: Prepare for whatever cyber criminals throw your way      

As cyber attacks become part of the cost of doing business, it seems so too may cyber security insurance. It’s not just a topic for enterprise-sized organizations. Nor does it take a global cyber crises engineered by a foreign power like NotPetya to put a company out of business. Garden variety ransomware can have cataclysmic repercussions for organizations of any size. And this subject will only get more complicated as current regulations expand and new ones are rolled out. 

Want to talk more about this topic and what your organization can do to successfully navigate today’s ever-changing threat landscape? Start a conversation with our Cyber Security team now by visiting: https://www.arrayasolutions.com//contact-us/.

We want to know what you think of this post! Leave us a comment on this or any of our blog posts through social media. Look for us on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique technology learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}