Cyber Security Insurance

It used to be so simple before the Internet era…If your employee stole cash from your business or forged a cheque, a crime insurance policy would cover it. If a non-employee broke into your business and stole money from the safe, a business combined would take care of the loss, under the peril of theft.

But the world we once knew has changed, and continues to evolve both socially and technologically….and it’s moving more quickly than ever.

Our businesses now depend upon technology and that reliance is expanding, as is cyber & data or ‘data’ theft and therefore our need to insure this evolving risk.

What if that same employee stole your customer’s credit card information or sold on sensitive information?

What if your computer network were hacked and your customer’s patented business information you were contractually obligated to protect was stolen?

Would your crime policy still respond?

The answer is, unlikely, hence why cyber & data liability insurance can be just as important as crime insurance to keep you and your reputation protected.

A crime insurance policy is designed to protect an insured business’ assets from theft by both employees and other third parties. Defined as a first party coverage, the policy is triggered if the insured sustains a direct loss because of theft.

It includes standard insuring agreements such as employee theft, forgery or alteration, theft on premises or in transit, counterfeit currency, computer fraud, funds transfer fraud and credit card fraud. It is very specifically designed to cover money, securities or other tangible property.

Cyber & Data liability policies are designed to insure loss of intangible property and the costs of rectifying systems damage. Think of your employee’s HR records, your company’s copyrighted material, formulas or documentation, your client’s personal information etc.

These are not tangible items, and thus not covered under a standard crime policy as mentioned above. The cyber & data liability policy also contains some first party coverages designed to directly reimburse you for specific costs and expenses associated with a breach.

Still unclear as to why do you need both? Each insurance policy serves a purpose in protecting your business’s assets, but neither covers all of the exposures. So in simple terms: –

Crime covers the fraudulently taking of money or property and Cyber & Data covers your IT system and data.

The truth remains that no ‘standard’ policy exists. And even though it may appear that crime exposures are addressed and covered in a cyber & data liability policy and vice versa, be wary of the exclusions, coverage triggers, and definitions. It is very likely that what may appear to be duplicate cover is far from it.

Busines News Wales:     Image: Nick Youngson

For more information on Cyber Security Insurance, please contact Cyber Security Intelligence, for advice.

You Might Also Read: 

Cyber Risk Insurance: A View From The Prudential Regulation Authority:

Cyber Insurance Report 2017 - 2018 (£):

Insurance Will Reduce Cyber Losses:

 

« North Korean Cyber Gangs Blitz the Irish
US Ready To Fight Hybrid War By 2030 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Halon

Halon

Halon is a flexible security and operations platform for in-transit email.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

CyberUSA

CyberUSA

CyberUSA is a collaboration of leaders and states focused on a common mission purpose of enabling innovation, education, workforce development, enhanced cyber readiness and resilience.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.