Cyber Security Insurance

It used to be so simple before the Internet era…If your employee stole cash from your business or forged a cheque, a crime insurance policy would cover it. If a non-employee broke into your business and stole money from the safe, a business combined would take care of the loss, under the peril of theft.

But the world we once knew has changed, and continues to evolve both socially and technologically….and it’s moving more quickly than ever.

Our businesses now depend upon technology and that reliance is expanding, as is cyber & data or ‘data’ theft and therefore our need to insure this evolving risk.

What if that same employee stole your customer’s credit card information or sold on sensitive information?

What if your computer network were hacked and your customer’s patented business information you were contractually obligated to protect was stolen?

Would your crime policy still respond?

The answer is, unlikely, hence why cyber & data liability insurance can be just as important as crime insurance to keep you and your reputation protected.

A crime insurance policy is designed to protect an insured business’ assets from theft by both employees and other third parties. Defined as a first party coverage, the policy is triggered if the insured sustains a direct loss because of theft.

It includes standard insuring agreements such as employee theft, forgery or alteration, theft on premises or in transit, counterfeit currency, computer fraud, funds transfer fraud and credit card fraud. It is very specifically designed to cover money, securities or other tangible property.

Cyber & Data liability policies are designed to insure loss of intangible property and the costs of rectifying systems damage. Think of your employee’s HR records, your company’s copyrighted material, formulas or documentation, your client’s personal information etc.

These are not tangible items, and thus not covered under a standard crime policy as mentioned above. The cyber & data liability policy also contains some first party coverages designed to directly reimburse you for specific costs and expenses associated with a breach.

Still unclear as to why do you need both? Each insurance policy serves a purpose in protecting your business’s assets, but neither covers all of the exposures. So in simple terms: –

Crime covers the fraudulently taking of money or property and Cyber & Data covers your IT system and data.

The truth remains that no ‘standard’ policy exists. And even though it may appear that crime exposures are addressed and covered in a cyber & data liability policy and vice versa, be wary of the exclusions, coverage triggers, and definitions. It is very likely that what may appear to be duplicate cover is far from it.

Busines News Wales:     Image: Nick Youngson

For more information on Cyber Security Insurance, please contact Cyber Security Intelligence, for advice.

You Might Also Read: 

Cyber Risk Insurance: A View From The Prudential Regulation Authority:

Cyber Insurance Report 2017 - 2018 (£):

Insurance Will Reduce Cyber Losses:

 

« North Korean Cyber Gangs Blitz the Irish
US Ready To Fight Hybrid War By 2030 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Cyber Future Foundation (CFF)

Cyber Future Foundation (CFF)

CFF was established to create a cyberspace where digital commerce and innovation can thrive based on trust and respect to individual privacy.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!