This story was delivered to BI Intelligence Apps and Platforms Briefing subscribers. To learn more and subscribe, please click here.

On Tuesday, anti-secrecy group WikiLeaks dumped a cache of files claiming to expose a war chest of tools the CIA used to hack devices running operating systems (OS) like iOS, Android, and Windows.

The CIA allegedly exploited “zero-day” flaws — vulnerabilities in software that are unknown to the vendor — to gain access to a multitude of functions on phones, connected TVs, and routers. WikiLeaks has shared these vulnerabilities online, meaning that the tools are available to any user globally. The CIA has yet to confirm the accuracy of the documents.

The zero-day exploits can supposedly be used to break into devices' operating systems, making the devices vulnerable to direct hacks. While the documents indicate there’s no way for hackers to penetrate end-to-end encryption — one of the most secure and popular methods of securing digital data while it’s in transit — hackers can access the text or audio messages on a user’s phone before encryption is applied. End-to-end encryption is particularly popular with messaging platforms, including Apple’s iOS, Signal, WhatsApp, and Telegram.

WikiLeaks’ findings could negatively impact the way mobile and connected devices are used. Data privacy is a major concern for both consumers and businesses, and the exposure of such robust vulnerabilities serve as a stark reminder that digital security is never ensured.

Tasks that require sensitive information on mobile devices today could take a downturn. The threat of third parties having access to a growing volume of sensitive data stored on smartphones could make consumers and businesses more reluctant to use these devices for everyday tasks such as mobile purchases, B2B communication, or talking to family and friends.

The threat of third parties having access to a growing volume of sensitive data stored on smartphones could make consumers and businesses more reluctant to use these devices for everyday tasks such as mobile purchases, B2B communication, or talking to family and friends. The introduction of new mobile tasks that rely on even more sensitive information could see diminished traction. Digital health and connected homes both necessitate connecting previously analogue parts of a consumer’s life to digital formats. If mobile and connected environments aren’t reliably secure, consumers may shy away from using them.

Digital health and connected homes both necessitate connecting previously analogue parts of a consumer’s life to digital formats. If mobile and connected environments aren’t reliably secure, consumers may shy away from using them. Connected speakers and voice assistants may not be as readily welcomed into homes. One segment of the WikiLeaks dump stated that the CIA was able to trigger the listening mode in connected TVs, speakers, and smartphones, enabling it to eavesdrop on conversations.

Companies will respond by patching the vulnerabilities that were brought to light. For its part, Apple argues that many of the CIA vulnerabilities aren’t effective on its devices. The company states that it's patched most of the holes already and is working on fixing new vulnerabilities, according to TechCrunch. The security of iPhones is of particular importance to Apple CEO Tim Cook. Apple spent a large portion of 2016 combatting efforts by the FBI to gain access into an iPhone involved in the San Bernardino shooting. Meanwhile, Android's heavily fragmented ecosystem will likely make it much more difficult to roll out patches for any existing vulnerabilities.

It's no surprise that companies are more worried than ever about the looming threat of hackers penetrating their networks. In the last year, the number of records exposed in data breaches rose 97%, according to the Identity Theft Resource Center.

The frequency and sophistication of cyber attacks are at an all-time high, and the costs associated with data breaches continue to rise. While companies are investing more in cybersecurity to ward off attacks, they know they won’t be able to spend their way to absolute security. A cybersecurity team of more than 1,000 staffers with a budget of $250 million wasn’t enough to save JPMorgan Chase from getting hacked in 2014. As a result, companies are turning to cyber insurance to help mitigate the costs of a potential breach.

However, insurers have been slow to extend cyber insurance to many businesses, as they have yet to develop proven tools to help them assess the risks and costs associated with cyber attacks. Cyber insurance policies also often have high premiums and low coverage limits to help protect insurers from incurring too much exposure to a cyber attack.

BI Intelligence, Business Insider's premium research service, has compiled a detailed report on cyber insurance that examines the growth of this market and identifies the key factors driving that growth. It also identifies the commercial sectors that are underserved in the cyber insurance market, which present a unique opportunity to insurers. Finally, it explains how insurers can find creative ways to cover these underserved markets while still limiting their overall exposure.

Here are some key takeaways from the report:

Cyber insurance plans cover a variety of costs related to cyber attacks, including revenue lost from downtime, notifying customers impacted by a data breach, and providing identity theft protection for such customers.

Annual cyber insurance premiums will more than double over the next four years, growing from to ~$8 billion in 2020.

However, many insurance companies have been hesitant to offer cyber insurance because of the high frequency of cyber attacks and their steep costs. For example, Target’s notorious data breach cost the company more than $260 million.

Insurers also don’t have enough historical data about cyber attacks to help them fully understand their risks and exposures.

There are large underserved markets with very low cyber insurance adoption rates such as the manufacturing sector, where less than 5% of businesses have cyber insurance coverage.

In full, the report:

Projects the growing demand and premiums for cyber insurance in comparison to other common forms of commercial insurance.

Illustrates how cyber attacks are growing more sophisticated and more costly, which is driving more companies to consider cyber insurance.

Explains the obstacles that insurers face in extending cyber insurance coverage to different types of businesses.

Provides insights on how insurers can overcome these challenges to grow their cyber insurance business without incurring too much risk.

To get your copy of this invaluable guide to cyber insurance, choose one of these options:

Purchase an ALL-ACCESS Membership that entitles you to immediate access to not only this report, but also dozens of other research reports, subscriptions to all 5 of the BI Intelligence daily newsletters, and much more. >> START A MEMBERSHIP Purchase the report and download it immediately from our research store. >> BUY THE REPORT

The choice is yours. But however you decide to acquire this report, you’ve given yourself a powerful advantage in your understanding of cybersecurity.