Cyber Insurance
Protect your business against the emerging threats of the digital age.

What is Cyber Insurance?

Cyber Insurance is used to protect businesses from risks relating to information technology infrastructure and activities. Risks of this nature are not catered for and even excluded under traditional liability and property policies.

Cyber-risk is an exposure that no modern business can escape, and the financial impact of system interruption, privacy breaches and ransom attack are now felt within all industries.

Cyber-liability provides cover in the event of a security breach which could take various forms that exist in the modern, technology environment where so many businesses are reliant on their IT systems.

What’s Covered

Atlas Insurance can offer the following covers with various limits options depending on your business needs.

Incident Response services via the use of a 24/7 designated incident response provider in the event of a privacy or network breach, and covers the expense of forensic investigations, customer support and monitoring, customer notification, legal oversight and public relations.

Network Interruption and Loss of Income including full data re-creation, consequential reputational harm and hardware repair and replacement.

Cyber Extortion and Ransom

Regulatory Fines and Penalties where insurable by law.

Privacy and Network Security Liability which includes cover against losses and reimbursement of costs for the failure to protect personally identifiable information triggered by theft, unauthorized access, viruses, or denial of service attack.

Multimedia Liability incorporates coverage against allegations of disparagement, libel, slander and copyright infringement as a result of errors, omissions and negligence in the gathering, creating and communication of an insured’s material.

 

Cyber Security Best Practices

All servers, firewalls, and IT infrastructure components restricted to appropriate personnel.

Backups taken at least weekly and stored in a secure off-site location or specialist cloud hosting service.

Restoration of data from your backups successfully carried out within the last year. One or more firewalls protecting external access to your systems.

All system users have individual, mandatory and non-trivial user IDs and passwords. Protection of all PCs and servers with anti-virus updated regularly.

All employees receive regular awareness training or educational information relating to phishing and other types of attacks.

Protection of all remote access, including access to cloud environments and MS Office 365, with encrypted connections such as a VPN.

Deploy Multi-Factor Authentication for all remote access, including access to cloud environments and MS Office 365.

Encryption from point-of-sale throughout payment process in relation to payment card transactions.

Review all content prior to posting on your Intranet Sites, Internet Sites or on social media that includes checks for disparagement, copyright infringement and trademark/trade name infringement.

Where It’s Needed

If your business practices include:

– Reliance on information systems and databases;
– Using a website for communications and online processes; or
– Collection and storage of Personally Identifiable Information;

then you should be protected, as this could be compromised in the event of a security breach.

We’re here to help

Get in touch with us to learn more or schedule a call. Alternatively, tell us more about your business so that we can provide you with a customised solution.