Cyber Insurance

computer threat insurance 400Individuals and businesses need to protect themselves against threats to thier personal information and digital seurity. The W.A. George Cyber Insurance policy covers: 

  • Credit Cards, Debit Cards
  • Social Security Numbers
  • Protected Healthcare Information (PHI)
  • Personally Identifiable Information (PII)
  • Driver’s License, Passport Information
  • Hacker Malfeasance
  • Lawsuit alleging trademark or copyright infringement
  • Lawsuit alleging invasion of privacy, defamation, of product disparagement

The cost to defend against these and many other breaches can be prohibitive. The W.A. George Insurance Agency Cyber policy is the lifeline for staying afloat or sinking. We will design limits of coverage to fit any exposure, from $300,000.00 to $50,000.000.00

Coverage

FIRST PARTY
  • Breach response costs
  • Crisis management
  • Notification costs
  • Forensics
  • Call center service
  • Fines and Penalties
  • Restoration Costs
  • Business Interruption
  • Extortion

THIRD PARTY

  • Information Security & Privacy
  • Liability
  • Network Security Liability
  • Website Media Liability
  • Judgments/Settlements
  • Defense Costs

Assess Your Risk 

A Checklist for assessing your level of cyber risk. These questions can give you a quick look into many of the areas of vulnerability that companies overlook.

  1. Are you aware of the coverage’s and gaps within standard property & casualty policies with respect to network security and privacy events? YES/NO
  2. Have you budgeted for a cyber security or privacy event? YES/NO
  3. Have you assessed your exposure to privacy regulator? Lawsuits by your customers? YES/NO
  4. Do you understand what regulated data you have, where it exists and in what format? YES/NO
  5. Do you have an incident response plan and/or a business continuity plan? YES/NO
  6. And there processes and procedures in place regarding data retention and data destruction? YES/NO
  7. Do you track and monitor compliance on an ongoing basis? YES/NO
  8. Are all of your procedures and policies with respect to your regulatory obligations documented? YES/NO
  9. Does your organization have processes to review and update privacy policies and disclaimers to customers? YES/NO
  10. Have you assessed how vulnerable you are to attack on the confidentiality, integrity and availability of your data and systems? YES/NO
  11. Is your risk exposure to technology or operations failures at your vendors and service providers fully documented? YES/NO
  12. Have you protected your company in contracts with vendors? YES/NO
  13. Have you fully assessed the physical security controls at each of your sites (data center, home office, field offices and other sites)? YES/NO