Many insurance companies are diving into the cyber risk insurance game, and some have names you already recognize
The concept of cyber risk insurance has only been around since 2005 and is an offshoot of Errors and Omissions insurance. That means the industry is relatively new and
Cyber risk insurance may be an entirely new idea for you, but it’s definitely something that you should include in your cybersecurity strategy along with your
Most cyber risk insurance policies cover the fallout from a breach, helping to cover the costs directly related to the incident. Depending on the policy you choose, this coverage
This allows the policy holder to recover some expenses following a breach, such as fixed operational expenses and lost profits. These clauses generally cover system failures, human error, and
Some cyber risk insurance policies also cover profit losses due reputational damages following a
If a breach has kept you from fulfilling customer and client obligations, you can be held legally liable for damages. A good cyber risk insurance policy can help you mitigate
Many verticals have stringent privacy rules and regulations. HIPAA is one that most people think of, with fees and fines for any violation they deem “negligent.” These regulations cover every employee working in the office, remotely from home, and even
Since many forms of malware can render hardware useless, a good cyber risk insurance policy will cover the replacement of damaged equipment following
Again, reading the fine print will help you understand the limitations of your cyber risk insurance policy. Many small to
Be aware for exclusions on BYOD and remote workers. Some of these exclusions can be very specific, like not covering a device that is unencrypted or refusing to cover employees who haven’t signed an acceptable use policy. In these cases, an employee’s personal device replacement costs will not be covered, even if it was destroyed as part of a malware attack. Read the fine print and make sure your coverage includes BYOD and remote
This stipulation has been snuck into some cyber risk policies to disallow payment for cyberbreaches occurring from
Your cyber risk insurance policy may cover profit loss to a degree, but many will not cover “future” losses and may have a limited amount of time following the breach where they will reimburse you for
Unless the devices and hardware were damaged because of a cyberattack, most cyber risk insurance policies will not cover updating or upgrading equipment even if doing so increases your
Choosing the right policy, like choosing your car insurance or health insurance, will depend on your company’s size and your industry’s threat levels. When comparing coverage, look for these
Cyber risk insurance will have deductibles, just like any other insurance policy. The average deductible, per a study from AdvisorSmith Solutions Inc., is around $10k for
Your existing business insurance company may offer cyber risk insurance as an
Since employees accidentally cause 90% of breaches , it’s important to choose a policy that covers unintentional employee actions such as responding to a phishing attempt, clicking infected attachments, or falling for a “spoofed” website. Make sure your policy covers “social engineering,” a blanket term that includes most of these
Just like getting a car insurance discount for taking a
APT cybercyber risk insurance coverage is tricky. The threat is not a single targeted incident; it is a slow process taking place over weeks, months, and even longer. Check to see how the cyber risk insurance carrier covers APT’s and choose a policy with longer time frames to collect for damages caused
Any policy you find will cover breaches to your own business…but what if the threat came from a
Some breaches occur because hackers cast out a wide net hoping to catch anyone they can while other attacks target a company specifically. There may be hidden clauses in the policy stating that you are only covered in the event of a targeted attack and not a wider spread
As part of the process of underwriting a policy, insurance providers typically conduct a basic audit of the potential customer’s cybersecurity practices. Most insurance provides look for the “minimal security controls” a potential customer has in place. Companies can best prepare for buying a cyber-insurance policy by conducting their own audits before the insurance
A good cyber-insurance risk assessment considers whether a
In addition to the above list, companies should have a written cybersecurity policy in place, provide basic security training to employees, and consistently review and respond to security monitoring alerts. All of these are very basic steps, and any company in today’s world not following those practices will likely have far bigger problems to worry about than being
At the most basic level, continual monitoring of network traffic is an absolute requirement. Security teams need to detect and respond to breaches before serious damage
Prospective
Contact us today to begin the process of getting your cyber risk