Professional Documents
Culture Documents
Approach that
Protects Your
Company from
Cybercriminals
A Guide to
Cyber Insurance &
Business Continuity for
Business Owners
By Hilary Buckley
Contents
Executive Summary ..................................................................................... 3
Protecting Your Company ......................................................................... 3
A New Age of Cybercrime ............................................................................ 3
Cybercriminals Can Come from Anywhere ............................................... 4
The Dangers of Cybercrime ......................................................................... 4
1. Cybercrimes High Costs ....................................................................... 4
2. Easy Criminal Access............................................................................ 5
3. Staff Misinformation............................................................................... 5
How Can You Protect Your Business? ........................................................ 6
What Is Business Continuity?.................................................................... 6
What Is Cyber Insurance? ......................................................................... 6
What to Expect from Cyber Insurance ......................................................... 7
What to Look For ....................................................................................... 7
Benefits ........................................................................................................ 8
Financial Help in the Event of a Cybercrime ............................................. 8
Protection in All Places, at All Times, on All Covered Devices ................. 8
Guaranteed Increased Data Protection and Possible Cost Incentives ...... 9
How to Choose a Good Provider ................................................................. 9
Take Your Next Step .................................................................................. 10
Executive Summary
Businesses today face difficulties far surpassing any of their previous challenges. In the
past, companies were able to protect private customer information with careful
management and well-secured offices. Now, no matter the security measures in place,
cybercriminals are able to steal computer files with seeming ease. Even worse,
companies attacked in these "cybercrimes" have an obligation to inform the public, which
brings down their brand reliability and can negatively impact sales.
To complicate the matter, companies today are not just at risk when their information is
maliciously stolen. If companies misplace critical information or if they open data up to
attack through simple user errors or absentmindedness, they are still held liable by the
federal government to inform their clients and the general public that they have faced a
potential security breach.
Luckily, most of us escaped from the data-breaches unscathed. However, that wasn't
everyone's experience. The shoppers who weren't as lucky had to deal with surprising
costs and effort to remedy their losses. In some cases, customers were unable to restore
their financial records to pre-breach strength.
1 BrianKrebs,TargetHackersBrokeinViaHVACCompany,KrebsonSecurity(blog),February5,2014,
http://krebsonsecurity.com/2014/02/targethackersbrokeinviahvaccompany/
2 HartfordSteamBoiler,SurveyShowsSmallBusinessesHaveBigDataBreachExposure,newsrelease,March6,2013,
http://www.munichre.com/HSB/pr06032013/index.html
3 RobertStrohmeyer,Hackersputabullseyeonsmallbusiness,PCWorld,August12,2013,
http://www.pcworld.com/article/2046300/hackersputabullseyeonsmallbusiness.html
4 FirstData,SmallBusinesses:TheCostofaDataBreachIsHigherThanYouThink,May2014,
https://www.firstdata.com/downloads/thoughtleadership/Small_Businesses_Cost_of_a_Data_Breach_Article.pdf
5 IBMandPonemonInstitute,2015CostofDataBreachStudy:GlobalAnalysis,May2015,
http://www01.ibm.com/common/ssi/cgibin/ssialias?subtype=WH&infotype=SA&htmlfid=SEW03053WWEN&attachment=SEW03053WWEN.PDF
By protecting your data and your business properly, you can lower all of your
cybercrime-related costs significantly.
3. Staff Misinformation
To explain why data security policies are so important, you must understand where data
security fails in your own business. Usually, your employees constitute the weakest link
in your security practices; human errors are responsible for 45% of computer
downtime.8
Not only do employees commonly open suspicious emails or attachments, they visit
unsecured websites, sign in to password protected wireless routers, such as a home or
coffee shop network to access data, and endanger your company data in many other
ways. It is a rare staff that contains the knowledge or skills to even identify a data breach.
There are ways to protect your data no matter where you are. However, unless youve
trained your employees to use safer methods, they wont.
These three problems creates significant risk for cyber insurers. If your insurers job is to
provide coverage when your data is compromised, they may be hesitant to do so if your
company is putting that data at risk with lax security practices. To make an analogy: If
your house insurance policy kicks in when your house burns down will they still owe
you if set the curtains on fire?
Symantec, 2011 SMB Disaster Preparedness Survey: Global Results, January 2011,
http://www.symantec.com/content/en/us/about/media/pdfs/symc_2011_SMB_DP_Survey_Report_Global.pdf?om_ext_cid=biz_socmed_twitter_facebo
ok_marketwire_linkedin_2011Jan_worldwide_dpsurvey
7
Evolve IP, Cloud of Dreams: The Adoption of Cloud Services 2014, accessed June 3, 2015,
http://pages.evolveip.net/2014-cloud-of-dreams-survey-bundle.html
8
Joseph McKendrick, Enterprise Data and the Cost of Downtime: 2012 IOUG Database Availability Survey, July 2012,
http://www.oracle.com/us/products/database/2012-ioug-db-survey-1695554.pdf
9 SamuelGibbs,Antivirussoftwareisdead,sayssecurityexpertatSymantec,TheGuardian,May6,2014,
http://www.theguardian.com/technology/2014/may/06/antivirussoftwarefailscatchattackssecurityexpertsymantec
COVERAGE TO CONSIDER
Media Liability
Network Security Liability
Privacy Injury Liability
Privacy Regulations Liability
Privacy Regulation Fines
Event Expense
Extortion Demand
Regulation Investigation
Crisis Response
Business Interruption and Expense
First-Party Network Loss or Damage
Basic E-theft
Benefits
With a combination of Business Continuity services and cyber insurance, businesses
can protect against all the main dangers of cybercrime.
10
Get the facts you need to get your perfect cyber insurance quote.
Start with a free Network Security Assessment from NetUp IT.
Schedule Your
Free Network Security Assessment
http://netup-it.com/free-network-assessment-new-jersey/
NetUp IT helps clients build, maintain, manage, and secure corporate IT infrastructure and
networks in the New Jersey and New York Metropolitan area.