This article discusses the significant liabilities that can arise when acquiring a company with inadequate cybersecurity safeguards, including legal penalties and reputational damage. Regulatory bodies are increasingly vigilant, with stringent requirements that can result in heavy fines and sanctions for non-compliance. For example, Quebec’s Commission d’accès à l’information may now impose administrative monetary penalties (AMPs) of up to CAD 10 million or 2% of the company’s worldwide turnover for violations of Quebec’s Act respecting the protection of personal information in the private sector (PPIPS). Additionally, data breaches or cyber incidents occurring post-acquisition can be traced back to pre-existing vulnerabilities, leading to legal disputes and financial losses. Read the full article for more details on:
Verizon’s acquisition of Yahoo in 2017, where the deal's significant price reduction was due to Yahoo's disclosure of two massive data breaches affecting over 1 billion user accounts. This case exemplifies the financial and reputational risks associated with acquiring a company with undisclosed or poorly managed cybersecurity issues.
Costs of Upgrading Cybersecurity Systems – The substantial costs associated with ensuring the acquired company's cybersecurity infrastructure meets the acquiring company's standards.
Insurance Considerations - The importance of reviewing the target company’s cyber insurance.
Best Practices for Cybersecurity in M&A - To mitigate risks and ensure smoother integration.
Cyber M&A Considerations from a Private Equity Perspective - How private equity firms must manage cyber risk throughout the lifecycle of their investments.
Insights from the 2024 Global Cyber Risk and Directors' & Officers' Liability Survey - Key findings from the survey to enhance cybersecurity strategies in M&A transactions.
Acquiring a company with inadequate cybersecurity safeguards can expose buyers to significant liabilities, including legal penalties and reputational damage. Regulatory bodies are increasingly vigilant, with stringent requirements that can result in heavy fines and sanctions for non-compliance. For example, Quebec’s Commission d’accès à l’information may now impose administrative monetary penalties (AMPs) of up to the greater of CAD 10 million or 2% of the company’s worldwide turnover for the preceding fiscal year for violations of Quebec’s Act respecting the protection of personal information in the private sector (PPIPS).
Additionally, data breaches or cyber incidents occurring post-acquisition can be traced back to pre-existing vulnerabilities, leading to legal disputes and financial losses.
In 2015, Anthem Inc., one of the largest health insurers in the U.S., attempted to acquire Cigna for $54 billion. However, a massive data breach at Anthem exposed the personal information of nearly 80 million individuals. The breach raised significant concerns about data security practices within the healthcare sector and contributed to the eventual failure of the merger. The case highlights the critical importance of robust cybersecurity practices in sectors handling sensitive personal data.
Ensuring the acquired company's cybersecurity infrastructure meets the acquiring company's standards can incur substantial costs. These expenses often include upgrading outdated systems, implementing new security protocols, and conducting employee training. Integrating the acquired company's systems with the acquirers can be complex and resource-intensive, often involving compatibility issues, secure data migration, and adherence to the latest security standards.
For instance, when integrating cybersecurity systems, companies may face unforeseen expenses such as:
Consideration should also be given to the target company’s insurance. Review whether they have Cyber insurance in place, and if so, perform due diligence on the coverage to identify any deficiencies that may exist. Nuances like the “change in control” provision would need to be addressed should the decision be made to keep the policy in force until such time that system integration can be considered. The acquiring company should also review their own Cyber policy to ascertain whether the target company would be able to benefit from automatic inclusion under their policy by reviewing the acquisition language, and if the target company falls outside of “automatic acquisition” threshold discuss options for inclusion at closing with their broker.
Types of insurance should also be understood/identified, to ensure that there are no gaps in coverage. For example, if the acquirer were to purchase a company that has business activities that slightly differ from their own, ensuring that coverage is fit for purpose is crucial. For example, a target company with Technology services, would likely have Technology E&O coverage in place, and therefore are likely to have contractual liability agreements in place so reviewing this exposure is also needed.
Cybersecurity deficiencies can delay M&A transactions, impacting the overall timeline and potentially the financial terms of the deal. Delays can arise from the need to conduct thorough cybersecurity assessments, remediate identified vulnerabilities, and obtain regulatory clearances. These delays can lead to increased transaction costs, extended periods of uncertainty, and potential loss of competitive advantage.
To mitigate risks and ensure a smoother integration process, we recommend our clients follow these best practices:
01
02
03
04
05
The model of private equity (PE) M&A differs from corporate M&A in several key aspects. Unlike corporate acquisitions, PE firms typically do not integrate the IT systems of their portfolio companies, thus eliminating IT integration concerns. However, this lack of integration can result in heightened cyber risk. Each portfolio company retains its own cyber risk profile, but the associated costs, liabilities, and potential reputational damage can impact the PE firm, making cybersecurity a high priority.
…if the acquirer were to purchase a company that has business activities that slightly differ from their own, ensuring that coverage is fit for purpose is crucial
Each portfolio company has different levels of cyber maturity and IT postures, influenced by their specific industry. A one-size-fits-all approach to cybersecurity may not be appropriate. Instead, tailored strategies that consider the unique risks and requirements of each portfolio company are essential.
PE companies are exposed to cyber risk throughout the entire lifecycle of their investments. Effective management of cyber risk, from initial due diligence of a target to sale preparation, can significantly impact the investment's value. Failure to address cyber vulnerabilities can lead to decreased valuation and increased liabilities.
Additionally, there is a potential increase in cyber incidents post-deal closure. Portfolio companies of PE firms might be seen as lucrative targets for cyber attackers, as these firms generally have more capital available to pay ransom demands. Thus, robust cybersecurity measures are crucial to protect these investments and mitigate risks.
The 2024 Global Cyber Risk and Directors' & Officers' Liability Survey provides crucial insights that can enhance cybersecurity strategies in M&A transactions. Here’s how these findings integrate into our recommendations:
… tailored strategies that consider the unique risks and requirements of each portfolio company are essential.
The survey indicates that organizations are significantly increasing their budgets for cybersecurity. This supports our recommendation to assess the costs of upgrading cybersecurity systems during M&A transactions. Key areas of investment include advanced threat detection and response solutions, employee training, and cybersecurity insurance. Companies are recognizing the need to proactively invest in cybersecurity to protect their assets and ensure smooth post-acquisition integration.
WTW stands out in the M&A space due to its specialized expertise and comprehensive solutions:
By following best practices and incorporating comprehensive cybersecurity assessments into the M&A due diligence process, organizations can mitigate potential liabilities, control costs, and ensure smooth transactions. For further information or to discuss tailored solutions for your needs, please contact us today. Additionally, explore our resources on cybersecurity in M&A for more insights.
Companies are recognizing the need to proactively invest in cybersecurity to protect their assets and ensure smooth post-acquisition integration.