Protection for the Modern Business
What is Cyber Insurance?
Cyber insurance* today covers a broad range of risk mitigation services, breach response services, and compensation for losses brought about by a cyber or data breach event.
Do I need Cyber Insurance?
Organizations invest heavily in IT systems, data management and the security for those systems. What happens if those investments fail or data security is breached?
Failure of those safeguards may cause sudden serious financial and reputational loss. Cyber insurance provides companies with the financial resources as well as expert talent to address a cyber breach, lawsuit or act of cybercrime.
What does Cyber
Cyber Insurance is About More Than Technology
There are a range of services and coverages often found in these policies.
- Employee Training
- Executive Training
- Educational Tools
- Documentation – up-to-date and comprehensive, including incident response, data recovery, and business continuity plans
- Alerts on evolving cyber threats
This coverage is not available in the $250,000 or smaller policies. It may be available from one or more of our AM Best A+ rated insurance partners.
- Privacy counsel may determine whether a breach has occurred and the legal duties facing the organization, including notification of regulators and third parties, under state and federal law
- Computer Forensics to determine the cause of an event
- Notification costs including professional notification as required by law
- Public relations and crisis management expertise and related costs
- Cost associated with credit monitoring services including identity theft coverage to assist the victims of a breach
- Ransomware. When an organization incurs authorized costs associated with ransomware, they may be covered.
- Data Recovery and Restoration. Insurance may cover the organization’s costs to recover and restore data.
- Business Interruption. Loss of profits or operating expenses of an organization may be covered.
- Contingent Business Interruption. This extraordinary coverage may pay for the costs arising from an organization’s inability to secure services from a services provider upon which the company relies.
 This coverage is available under the $250,000 Program
 This coverage is not available under the $250,000 Program but may be available from one of our A+ rated AM Best providers on policies of $1M or more.
- Network liability coverage which provides for the defense costs and payment of damages arising out of a breach of the company’s system that impacts another
- Privacy liability coverage which provides for the defense costs and payment of damages arising out of a breach of the company’s system that impacts the privacy rights of an individual
- Regulatory Fines and penalties which support a company for the defense costs and damages in the event a regulator determines an event or its handling failed to meet the appropriate standards
Website media coverage is only available on policies of $1 million or more.
- Social Engineering. Cyber insurance may cover the loss of funds arising from fraudulent instructions.
Does Cyber Insurance Replace Cybersecurity?
(Hint: The answer needs to start with no.)
- Cyber insurance does not replace the need for cybersecurity
- Regulatory compliance is not the same as cybersecurity
- Cyber insurance helps manage a defined range of cyber risk
Regulatory compliance may be mandated or represent best practices. Cyber risk assessment, measurement, management, and mitigation are the bedrock of a healthy organization.
AssuredOne - More than Cyber Risk Insurance
We deliver a best in class evaluation of your company’s cyber risk. The benefits of using our system include: objectivity, independence, uniform measurement tools and the ability to customize risk assessment and improvements, consistent with your ecosystem whether you are a boutique, SME, enterprise, or a Fortune 500 company.
Cyber Health Essentials™, Cyber Pro Maturity™ and TripleHelix®
Right-sized cybersecurity assessments are offered in four tiers of Cyber Health Essentials™– for smaller organizations, typically under $20 million in gross revenue, and in two tiers of Cyber Pro Maturity™, for medium-sized companies.
The full TripleHelix® assessment is reserved for larger organizations and high-risk organizations. TripleHelix® entails an on-site visit by Assured’s cybersecurity engineers and, itself, is tailored to the complexity of the organization’s ecosystem, indicative threats, history, and third-party data or reliance upon the organization’s products or services. Many proprietary features of Assured’s cybersecurity assessment system inform the thoughtful insights offered by the roadmap and CyberScore®.
Among the unique assessment tools of a TripleHelix® assessment is AssuredScanDKV® — the world’s only patented Deep Software Scanner. AssurededScanDKV® picks up where network scanners stop and provides precise identification of known vulnerabilities in the binaries of any software. This tool is critical to improving security because more than 80% of all of the successful cyber-attacks exploit known vulnerabilities in the software. AssuredScanDKV® provides reliable step-by-step remediation instructions.
Libby Benet, past-president of AssuredOne, discusses effective management of cybersecurity threats in this two part episode of the Paradigm Shift Podcast.
Chairman and CEO of Assured Enterprises Inc., Stephen Soble, spoke with Information Security Media Group in London.
In Episode 68 of the Paradigm Shift Podcast, Libby Benet, past-president of AssuredOne, discusses her path from lawyer to insurance executive to cybersecurity advocate in The Truth and the Myth of Managing Cyber Security Risk.