{"id":183,"date":"2016-12-23T09:26:04","date_gmt":"2016-12-23T14:26:04","guid":{"rendered":"https:\/\/elliottinsuranceservices.com\/blog\/?p=183"},"modified":"2016-12-23T10:08:47","modified_gmt":"2016-12-23T15:08:47","slug":"what-is-cyber-insurance","status":"publish","type":"post","link":"https:\/\/elliottinsuranceservices.com\/blog\/2016\/12\/23\/what-is-cyber-insurance\/","title":{"rendered":"What is Cyber Insurance?"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-large wp-image-184\" src=\"https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber-1024x576.jpg\" alt=\"Cyber insurance - cyber liability\" width=\"625\" height=\"352\" srcset=\"https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber-1024x576.jpg 1024w, https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber-300x169.jpg 300w, https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber-768x432.jpg 768w, https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber-624x351.jpg 624w, https:\/\/elliottinsuranceservices.com\/blog\/wp-content\/uploads\/2016\/12\/cyber.jpg 2048w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/p>\n<p>Cyber insurance is becoming the new buzz word in the insurance industry and its showing no signs of slowing down.\u00a0 Computers are targeted at businesses large and small every day.\u00a0 If you keep any customers personal information, employees information, e-commerce transactions, or hold any important data on your computers that a hacker could use; you may want to consider reading further.<\/p>\n<p>Cyber insurance is often referred to as \u201ccyber risk insurance\u201d or \u201ccyber liability insurance\u201d and it is designed to help a business recover after a cyber event (data breach, hack, etc.) by offsetting the insured costs associated with recovering from cyber events.<\/p>\n<p>Every insurance company that currently offers cyber insurance has slightly different policy terms.\u00a0 Some insurance companies offer endorsements to your current policy or they could have cyber coverage built into their existing commercial policies.\u00a0 The endorsement or built in policies tend to offer cyber coverage that is more of a help-line to point you in the right direction.\u00a0 These help-line based policies are not actually covering you, but they are providing you with the information to start your recovery process.<\/p>\n<p>Cyber Insurance policies may contain some or all of these four components:<\/p>\n<p style=\"padding-left: 30px;\"><strong>First &amp; Third Party Liability:<\/strong><br \/>\nCyber liability coverage protects companies for their liability to others and provides reimbursement for expenses related to your covered cyber event. Examples of third and first party coverage on the majority of standalone cyber insurance policies:<\/p>\n<ul>\n<li style=\"padding-left: 30px;\">Notifying clients that their information has been exposed and the legal expenses to determine notification requirements.<\/li>\n<li style=\"padding-left: 30px;\">Purchasing a credit monitoring service for the affected customers of a data breach.<\/li>\n<li style=\"padding-left: 30px;\">Starting a public relations campaign to manage your company public image after your breach.<\/li>\n<li style=\"padding-left: 30px;\">Business interruption coverage to offset the cost of the lost income due to a covered loss.<\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\"><strong>Media Liability:<\/strong><br \/>\nCoverage for claims arising from copyright infringement, plagiarism, defamation, libel and slander in electronic content.\u00a0 The majority of businesses are now online in some shape or form, and this will open their business up to claims arising from what the company puts online.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Network Security:<\/strong><br \/>\nA failure in your network security could cause a massive loss to your company.\u00a0 The network security component of a cyber insurance policy is what most people think of when they think of Cyber Insurance.\u00a0 Some examples for this component are network attacks that bring down your internal network causing financial loss, data breaches, virus transmission originating from your computers, or even cyber extortion.<\/p>\n<p style=\"padding-left: 30px;\"><strong>Privacy:<\/strong><br \/>\nIdentity thefts and stolen credit card information is not a new topic any longer.\u00a0 Companies can be vulnerable to privacy related breaches even if they don\u2019t have computers online.\u00a0 It is not uncommon to have cases that involve an employee losing or misplacing a device with a customer\u2019s information on it.\u00a0 This could even be your cell phone that receives work emails.\u00a0 If that cell phone were to be lost or misplaced, you could have a privacy breach waiting to happen.\u00a0 The thieves are getting smarter and even know how to pull the memory of recently printed pages from that laser printer you threw out last week.<\/p>\n<p>The main idea behind cyber insurance is to have third and first party liability coverage.\u00a0 This would protect the business for its liability to others and reimburse the insured for expenses incurred due to the breach.\u00a0 The coverage should extend worldwide and hopefully include coverage for defence costs for covered lawsuits.\u00a0 There are cyber insurance policies that will cover the costs for repair and restoration of the computer programs, electronic data, and even extensive enough to cover the costs of hiring a breach response firm.<\/p>\n<p>The vast differences in every policy are the main reason we would suggest an experienced broker walk your company through the process of choosing the right coverage for them.\u00a0 <a href=\"https:\/\/elliottinsuranceservices.com\/contact-us\">Contact us<\/a> today to make sure you are properly covered with an adequate policy for your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber insurance is becoming the new buzz word in the insurance industry and its showing no signs of slowing down.\u00a0 Computers are targeted at businesses large and small every day.\u00a0 If you keep any customers personal information, employees information, e-commerce transactions, or hold any important data on your computers that a hacker could use; you may want to consider reading&#8230; <a href=\"https:\/\/elliottinsuranceservices.com\/blog\/2016\/12\/23\/what-is-cyber-insurance\/\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":184,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[26,135,148,146,147,149,150],"class_list":["post-183","post","type-post","status-publish","format-standard","has-post-thumbnail","placeholder-for-hentry","category-commercial-insurance","category-liability-insurance","tag-business-insurance","tag-business-interruption","tag-cyber","tag-cyber-insurance","tag-cyber-liability","tag-hack","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":0,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/media\/184"}],"wp:attachment":[{"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elliottinsuranceservices.com\/blog\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}