Cyber Insurance Buyers Guide

 In Blog, Cybersecurity

How to get started when shopping for cyber insurance

How do you know if you need cyber insurance?

There are many important differences between large and smaller companies when it comes to cyber insurance needs. Smaller businesses are more at risk of successful cyber-attacks than larger ones as they often lack the budget and expertise to implement effective cybersecurity strategies. Large corporations are more likely to be targeted in hacks, so they buy coverage directly from insurers and have their own legal, public relations, and technology expertise. Small and medium-sized companies are increasingly looking at cyber insurance as another way to mitigate risk. They usually shop through agencies and typically need outside crisis management help.

 

Find the coverage that works for you

Did you know that general business insurance does not cover cyberattacks? There are different coverages and requirements, depending on what you are looking for. Use this guide to make sure you don’t pay high premiums and that you choose the liability policy that will actually respond to your risks and vulnerabilities.

 

Ensure that your business qualifies for coverage

Underwriters may refuse to cover organizations that don’t use multi-factor authentication or specific categories of endpoint protection products. Some insurance providers give precedence to companies with network features that stop attacks from spreading through the system when considering who to underwrite.

 

What does cyber liability cover?

Unlike general liability insurance, cyber liability policies don’t offer all-inclusive coverage.

Most SMB companies that do have cyber insurance only cover liability ($50K), which against a major breach won’t be enough. Cyber liability provides financial coverage for expenses related to a data breach. These expenses can accumulate rapidly once a data breach is discovered and reported. Here is a breakdown of what is typically covered:

 

Customer Loss

Business Disruption Regulatory Fines

Legal Costs

Public Relations Direct Financial Loss

 

Types of Cyber Insurance

Hacksurance: Insurance against cyberattacks and hacking attacks

Theft and fraud: Covers destruction or loss of the policyholder’s data as the result of a criminal or fraudulent cyber event, including theft and transfer of funds

Forensic investigation: Covers the legal, technical, or forensic services necessary to assess whether a cyberattack has occurred

Business interruption: Covers lost income and related costs where a policyholder is unable to conduct business due to a cyber event or data loss

Extortion: Provides coverage for the costs associated with the investigation of threats to commit cyberattacks against the policyholder’s systems and for payments to extortionists who threaten to obtain and disclose sensitive information

Reputation Insurance: Mitigates against reputation attacks and cyber defamation

Computer data loss and restoration: Covers physical damage to computer-related assets, including the costs of retrieving and restoring data, hardware, software or other information destroyed or damaged as the result of a cyberattack

 

Cyber Insurance Checklist

No business is excluded from the risk of a cyberattack. If you are considering adding insurance to your security infrastructure, you will likely need to adopt multi-factor authentication to qualify for coverage. Use this checklist to evaluate your existing cybersecurity practices and determine which insurance type is right for you.

Management

  • Do you have the budget to cover implementation costs and policy coverage?
  • Do you have an attestation document?
  • Have you identified the type of insurance that fits your business?
  • Are you educating your staff about cybersecurity best practices?
  • Have you identified key vulnerabilities your business is exposed to?
  • Are you complying with regulations such as GDPR, HIPAA, and PCI DSS if they apply to your business?

IT Operations

  • Do you have internal IT staff or service providers managing security?
  • Are you performing security tests?
  • Do all computers have antivirus software?
  • Are you scheduling system backups regularly?
  • Are you documenting known issues or risks?

Security Controls

  • Is MFA required to ensure secure email access?
  • Is MFA required for all remote access to your company’s network? Are you protecting remote and internal access to infrastructure components (routers, firewalls)?
  • Are you protecting internal and remote access to your company’s endpoints and servers?

Qualify for Cyber Insurance with AuthPoint MFA

Effective MFA protection with unique mobile DNA

AuthPoint uses a mobile device DNA to match the authorized user’s phone when granting access to systems and applications. Therefore, any attacker who clones a user’s device to access a protected system would be blocked – since the device DNA would differ.

 

AuthPoint protects your business and blocks cyber attacks

 

SECURITY IN KEY AREAS                                           PREVENTION OF MOST COMMON THREATS
User access User credential hacks
Cloud applications Phishing
Company networks Keyloggers
Remote access/VPN Brute force attacks

 

Easy to use, Cloud-based, and cost-effective.

Start today with a free 30-day trial – watchguard.com/mfa-trial

 

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt

Start typing and press Enter to search