Cyber Security Insurance

It used to be so simple before the Internet era…If your employee stole cash from your business or forged a cheque, a crime insurance policy would cover it. If a non-employee broke into your business and stole money from the safe, a business combined would take care of the loss, under the peril of theft.

But the world we once knew has changed, and continues to evolve both socially and technologically….and it’s moving more quickly than ever.

Our businesses now depend upon technology and that reliance is expanding, as is cyber & data or ‘data’ theft and therefore our need to insure this evolving risk.

What if that same employee stole your customer’s credit card information or sold on sensitive information?

What if your computer network were hacked and your customer’s patented business information you were contractually obligated to protect was stolen?

Would your crime policy still respond?

The answer is, unlikely, hence why cyber & data liability insurance can be just as important as crime insurance to keep you and your reputation protected.

A crime insurance policy is designed to protect an insured business’ assets from theft by both employees and other third parties. Defined as a first party coverage, the policy is triggered if the insured sustains a direct loss because of theft.

It includes standard insuring agreements such as employee theft, forgery or alteration, theft on premises or in transit, counterfeit currency, computer fraud, funds transfer fraud and credit card fraud. It is very specifically designed to cover money, securities or other tangible property.

Cyber & Data liability policies are designed to insure loss of intangible property and the costs of rectifying systems damage. Think of your employee’s HR records, your company’s copyrighted material, formulas or documentation, your client’s personal information etc.

These are not tangible items, and thus not covered under a standard crime policy as mentioned above. The cyber & data liability policy also contains some first party coverages designed to directly reimburse you for specific costs and expenses associated with a breach.

Still unclear as to why do you need both? Each insurance policy serves a purpose in protecting your business’s assets, but neither covers all of the exposures. So in simple terms: –

Crime covers the fraudulently taking of money or property and Cyber & Data covers your IT system and data.

The truth remains that no ‘standard’ policy exists. And even though it may appear that crime exposures are addressed and covered in a cyber & data liability policy and vice versa, be wary of the exclusions, coverage triggers, and definitions. It is very likely that what may appear to be duplicate cover is far from it.

Busines News Wales:     Image: Nick Youngson

For more information on Cyber Security Insurance, please contact Cyber Security Intelligence, for advice.

You Might Also Read: 

Cyber Risk Insurance: A View From The Prudential Regulation Authority:

Cyber Insurance Report 2017 - 2018 (£):

Insurance Will Reduce Cyber Losses:

 

« North Korean Cyber Gangs Blitz the Irish
US Ready To Fight Hybrid War By 2030 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

Promon

Promon

Promon is an application security vendor providing Self-Protection abilities to Mobile apps and Desktop applications.

Muninn

Muninn

At Muninn (aka Wehowsky), we specialize in mitigating potential risks within your network, providing one of the leading network detection and response (NDR) solutions on the market.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

MAD Security

MAD Security

MAD Security is a premier provider of information and cybersecurity solutions that combine technology, managed security services, support and training.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Troye Computer Systems

Troye Computer Systems

Troye provide a complete range of digital workspace solutions that empower people to do their very best work in a safe and secure manner anywhere, anytime, using any device.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.