Cyber Protect

For Business Cyber Event & Privacy Liability

Services

Services
FBC Liability

For Business Cyber Event
& Privacy Liability

When it comes to identifying cyber risks within a business, many are still unfamiliar with what could possibly go wrong,
and the costs and disruptions incurred as a result.
As with our reliance on using technology, what we can live with and then live without, you would be excused for thinking that you would
just make do, and the business would try to operate as normal (buy new phones, update servers/hardware, find a new cloud host, etc).
But whether due to an error of judgement or, by not accepting the advice of your MSP to increase your cybersecurity in the first place
(eg. Multi Factor Authentication, Endpoint verification) your business’s ability to stay immune from a cyber-attack, let alone recover in the days,
weeks or years following, depends largely on your ability to control the consequences of a breach.
Your MSP understands there are ongoing risks to the businesses they service or why would they be doing what they do?
However, even where you have the best, most reliable MSP in the world and great staff who really understand the technology they use, then ask yourself.

How would I control my business as it weathers a cyber-attack?

While adding layers upon layers of Security to your tech software and hardware is important, arranging Cyber Insurance to safeguard your business and having an Incident Detection & Response plan to know when to report a breach is super important. This is why we are here in support.

What would it cost NOT to have Cyber Insurance?

Firstly, your MSP understands that by co-ordinating covers through our Cyber Partner Protect program it will provide afforded insurance protection for your business. What you can then expect is a professional response to a claim that is managed, measured, and resolved so Expenses then arising from a cyber event is not coming out of your hip pocket.
In a worst-case scenario, you should also consider what is most valuable when working with technology: –
By then NOT having a Cyber Insurance plan (not just policy) effectively means that the important relationship between you and your MSP is put under pressure and at that point, we stand by wholeheartedly that the relationship with your MSP must remain strong in the face of a cyber event. As a business owner, you will know whether you have other uses for technology unique to your business.
Claims expenses can be derived through either Incident Response costs, with the aim of recovering back to normal business operations, as well as costs in the aftermath which could then be Income loss through say losing a customer or potential order, or other costs of Working that are expenses not usually incurred in getting your operations back online sooner than later following a cyber event.

Here is what you can expect to be covered in the event of Cyber Incident

  • Bodily injury and property damage
  • Prior known facts or circumstances Intentional or fraudulent acts
  • Damage to computer hardware
  • Upgrading of an application, system or network
  • Failure or outage of power, utilities, satellites or telecommunication services

SO, what is a Cyber Incident?

is someone or a group that intends to perform malicious actions against
other cyber resources such as your server, laptop, smart phone, a major
supplier, your cloud host, or IT providers managed systems……

What is Cyber Insurance?

Covers Financial losses you incur caused by a cyber incident.

Who causes a Cyber Incident?

An adversary that may not care who you are, what information you hold, how much money is in your bank account, only that they want to disrupt your normal operations.
Bit like a vandal, where there is no monetary gain in what they do only that- for a Cyber Hacker it is a mark of respect or notoriety in their world of breaching your Systems, THEY WIN, YOU LOSE!

Who is a cybercriminal, hacker, or adversary?

is someone or a group that intends to perform malicious actions against
other cyber resources such as your server, laptop, smart phone, a major
supplier, your cloud host, or IT providers managed systems……
It is an average person (bad actor)
A criminal with intent
A business competitor, enemy or opponent
State actors – who play a role in gaining information control and breaching cybersecurity

Incident v Breach

A Breach is because of an event.
Regulatory authorities such as the OAIC through its Privacy Commissioner
have powers to impose a significant fine or penalty based on how you respond
to a matter that involves stolen customer information.
Breaches, unless proven otherwise, could even be someone purporting to
be the owner or Director sending offensive information to a staff member personally or via social media (Identity Theft).

If you have concerns about the vulnerability of your business to a cyber breach or attack, please talk to us.

The Cyber risk heat map below (courtesy of CFC Underwriting) was built from over 2,500 claims one of our select underwriters
have dealt with through incident responses.
As a snapshot this offers some examples of different industries’ exposures to business interruption, privacy and cybercrime
that may help as you talk to us.
It does not have to be the case of losing control when a cyber event takes hold of your Technology.
But whether by Error or Misfortune we are here in support of: –
PREVENTION , MITIGATION , REMEDIATION