Call Monday-Friday, 8:30am ET to 4:30pm ET: 1.800.347.1109

Home » Insurance Plans for Your Firm » Cyber Liability

Cyber Liability InsuranceCyber Liability

Protecting your firm against cyber attacks should be easy. With our plan, it is.

If your firm uses the internet, wireless connections, mobile devices, laptop computers and other technology, it is increasingly vulnerable to costly cyber exposures. This growing risk can be mitigated with a cyber liability insurance policy. We are pleased to offer you a comprehensive policy to help protect your firm from this ever-growing threat. Many companies have a complicated application process. We don’t.

What is cyber insurance?
When a breach occurs, cyber insurance covers the range of expenses that arise. These include identifying and solving the breach, recovering data, customer notifications, PR costs, possible credit monitoring expenses, legal expenses, potential fines from compliance regulators, extortion costs from ransomware, and general business interruption.

Do hackers really bother with attacking small businesses?
Yes. A Forbes article reports that small businesses are three times more likely to be targeted by cyber criminals than larger companies. Small businesses are an easier target because of their lack of resources and security expertise. Any business with a computer and an internet connection is at risk.

What does a cyber policy cover?

  • First-Party Coverage | Covers damages your firm suffers because of a cyber breach. This can include investigative services, business interruption coverage and data recovery.
  • Third-Party Coverage | Covers damages if your clients or partners are affected by a cyber attack. This can include legal fees, settlement costs, security failures and media liabilities.
  • Cyber Crime | Covers damage due to any type of illegal activity that occurs using digital means. Examples of cyber crime are extortion/ransomware, phishing, social engineering, and wire transfer fraud.

Doesn’t my current business insurance include cyber attacks?
Many general business protection policies only partially cover damage from cyber events, if at all. A cyber insurance policy protects against the vast array of possible damages, expenses, and lost business that can occur from a cyber attack.

What should I consider when choosing between purchasing a standalone cyber policy vs. adding an endorsement to an existing policy?
To be fully protected, ensure you have all coverages – first-party, third-party, and cyber crime. Further, since some cyber events can result in large expenses, confirm you have adequate sub-limits for each of the three coverages.

Do small businesses need cyber insurance if they practice good cyber hygiene?
Good cyber hygiene definitely helps. However, there is no way to fully protect against new threats. Hackers are always adapting to overcome cyber defenses with new versions of current threats or creating new methods of attacking businesses. Human error is also a factor. Easy-to-hack passwords, phishing emails, or even a lost laptop present potential entry points for a cyber criminal. Additionally, a third-party vendor could be attacked, impacting your ability to do business and exposing your data. Even if you use a third-party vendor for business services, as the data owner you may be legally responsible. A thorough cyber insurance policy is part of your overall risk management plan to ensure your firm runs smoothly.

Don’t wait; take a minute to complete and submit the following form to receive a no-obligation quote.

*Multi-factor authentication (MFA) is one of the easiest and most effective ways to prevent ransomware attacks. MFA requires users to verify their identity at least twice when logging in to your applications, ensuring the user is who they say they are. And, it’s easy implement.

How to implement MFA:
Google Suite MFA Activation Instructions (Note, Google refers to MFA as 2-step verification, be sure to require 2-step verification when setting up)

Microsoft 365 MFA Activation Instructions

For other services, you can use an MFA solutions provider such as Google Authenticator, Microsoft Authenticator, or Authy.