A Cyber and Data Breach Insurance solution that is easy to implement, understand and utilize if needed.
Our market leader insurance carrier partner combined with our superior claims and breach response services help you cover the financial costs associated with a cyber or data breach – and allows you to get back to business with little interruption or reputational damage.
The role of Cyber and Data Breach Insurance
Insurance can't eliminate a data breach or be a replacement for data security, but it can provide a backstop of financial relief. Cyber insurance helps tame the significant costs of a cyber attack and/or data breach by offering coverage to help cover your costs. These costs can be extensive as you have to respond to, as well as minimize the damage of a data breach or cyber attack. The insurance can help to pay for the data breach notification and credit monitoring, forensics and investigations, business interruption, data recovery and repair, regulatory fines and penalties, and potential extortion threats.Play Video
Malicious actors continually seek new security vulnerabilities to exploit and access valuable and sensitive information. Many companies believe privacy and data breaches won't happen to them, but three key facts stand:
Breaches are bigger and more costly than ever before
Every industry and size of business is at risk
All organizations are susceptible to both internal and external threats
Covers costs to defend and resolve claims with regard to the handling of personally identifiable or confidential corporate information. Covers negligence, violation of privacy or consumer protection law, breach of contract and regulatory investigations. Covers issues resulting from the failure of network security, including the negligent transmission of a virus and the inadvertent participation in a DDoS attack against a third party.
Coverage for costs associated with responding to a breach, such as forensic costs to confirm and identify the breach, costs to notify affected individuals, credit protection services including costs to staff a call center for redemption of monitoring offers, and crisis management and public relations costs.
Covers financial loss, such as business income when a company has its network-dependent revenue interrupted. Traditionally, this has been for fire, flood, etc. but technology growth has created new BI perils (viruses, tech failures, programming errors and computer hacking).
Covers costs to recreate or repair damaged or destroyed data, systems or programs. In a digital world, property is no longer exclusively tangible, so specialized coverage is needed to pay for intangible data recovery costs.
Covers the response costs and financial payments associated with network-based ransom demands. With the proliferation of ransomware such as Cryptolocker and anonymous currencies such as Bitcoin, network extortion demands are on the rise. In the digital world, intangible assets are 'kidnapped' and extorted with threats to shut down a system or divulge sensitive or proprietary information.
Coverage for acts of terrorism is included in your policy, as amended in 2015, by the TRIA (Terrorism Risk Insurance Act).
if your company processes credit / debit card transactions this coverage will be automatically included.
Costs to defend and resolve claims related to online content, such as defamation or trademark or copyright infringement.
This additional endorsement to provide coverage (subject to the selected sublimit) for losses incurred when some criminal disguises as a vendor, client or employee and tricks the insured’s employee into transferring funds to an account not under the control of the company.
FREQUENTLY ASKED QUESTIONS
There can be a lot of confusion around Cyber and Data Breach Insurance. We are here to help answer some of the most common questions you may have regarding privacy exposures and coverage.
Why purchase Cyber Insurance from Cyber Insurance
Simple and Affordable
We are Specialists
Loss Prevention Services
Rapid Breach Response
Fast Claim Processing
Access to Experts
Membership in the ACADSA
* Source - Verizon Communications Data Breach Investigation Report
** Source - Ponemon Institute® LLC and IBM®
*** Source - National Cyber Security Alliance
**** Source - Osterman Research 2017 SME Cyber Security Survey