GetCyber — What is Cyber Insurance?
What is cyber insurance page background waves
What is cyber insurance page background waves
What is cyber insurance page background waves
What is cyber insurance page background waves
Getcyber.com

What is
Cyber Insurance?

Modern businesses depend on digital technology. Technology makes them more efficient, but it also leaves them vulnerable to technical failures and cyber attacks. Innocent mistakes, like an employee clicking on a malicious link in an email, can quickly turn into six or seven-figure catastrophes.

Cyber insurance helps companies mitigate the financial risks and liabilities that come with modern technology.

A single cyber policy can cover the costs of a wide range of events, including:

  • Password Icon

    Data Breaches

  • Paper Fail Icon

    Invoice Scams

  • Shield Fail Icon

    IT Downtime

  • Calendar Icon

    Equipment Destruction

  • Down Arrow Icon
    and more

Many cyber insurance policies include additional risk-preventing services including access to expert security services that help remedy cyber events as they occur.


Every business faces cyber risk

Any business that uses technology is at risk. Even a small digital presence carries liability: your corporate Facebook page could be defaced, damaging your reputation and alienating customers, or your email account could be breached, leaking your customers’ data for which you may be liable.

People with phones
Women with hands in air

Cyber risk: more than just hacking

Many cyber insurance policies cover more than just attacks on your company. If a vendor you depend on goes offline, you may be covered for lost revenue while you are unable to operate as well as any expenses you incur restarting your operations.

Protect your small business

While cyber attacks on large companies are frequently in the news, most cyber attacks are on small companies. It is especially small businesses that are at risk, because they usually have fewer resources to invest in security and to defend themselves. That is precisely why insurance is most useful for small businesses.

Shelf with jars

Protect yourself from cyber attacks

Danger Icon
Attacks are more frequent

Cyber attacks are becoming more frequent and severe. Cyber criminals are taking advantage of businesses adapting to remote work and relying more on technology.

Cost Icon
Recovery costs millions

Cyber incident recovery costs frequently exceed $1M and can easily bankrupt a small business. A recent study shows that 60% of small businesses go bankrupt within six months following a data breach.

Contract Icon
It’s a contract requirement

Cyber insurance is increasingly required when signing contracts for everything from service contracts to equity investments. Purchasing a policy in advance can help secure contracts faster.

Common Coverages

Below are the most common cyber insurance coverages. At GetCyber.com, we want you to have all your bases covered – we will provide you with every coverage below whenever possible, and highlight any limitations or exclusions when you compare quotes.

Coverage for notification costs, forensic costs, legal expenses, and crisis management in the event of a data security or privacy breach.

Example

Your database containing customer payment information gets breached. The insurer will pay for security forensics on the breach, and for notifying affected customers about the event.

Coverage for lost revenues or expenses incurred due to an interruption or outage of an insured’s systems caused by a cyber security breach.

Example

A cyberattack knocks important servers offline, preventing you from completing sales. The insurer will cover both the revenues lost due to downtime, and the costs to put the servers back online.

Coverage for lost revenues or costs due to Business Interruption as a consequence of third parties suffering outages that prevent the insured from generating revenue or operating normally.

Example

The vendor managing your IT system has downtime due to a cyber attack. Consequently, you cannot process new sales. Your insurer will reimburse you for those lost revenues.

Coverage for costs due to sickness or bodily harm to a person caused by a cyber event suffered by a third party.

Example

Your factory has a conveyor belt that is controlled by software managed by a third party. The third party is breached, their software stops working, and conveyor belt malfunctions, injuring a worker. The insurer will pay for the worker’s medical expenses.

Also known as ransomware, this is coverage for costs associated with a cyber extortion event, including extortion monies paid as a result of an extortion threat.

Example

A hacker breaches your customer database and threatens to delete the data unless you pay them a fee. The insurer will cover this fee.

Coverage for losses due to customer invoices being fraudulently sent or modified.

Example

A criminal gains access to an employee’s email account, and sends a legitimate-seeming invoice to one of your customers. The customer pays the invoice to the criminal, while your company does not get paid. The insurer will cover the net financial loss to you.

Coverage for expenses incurred in an alleged privacy or data breach, such as remediation and defense/damages in the event of litigation due to the breach.

Example

Your customer database is breached and your customers’ passwords are leaked. A customer consequently suffers damage and sues you. The insurer would cover the costs of your litigation defense.

Coverage for damages due to the publication of media material (text, sounds, images, etc.) that results in allegations of defamation, slander, trademark or copyright infringement, etc.

Example

Your company changes its logo. Another company alleges that your new logo infringes on their trademarked logo. The insurer would cover any legal costs in defending your new logo.

Also known as Data Security Standard (“DSS”), this is coverage for losses (defense costs and corresponding fines and penalties) due to any alleged or actual noncompliance with PCI security standards.

Example

Your company accidentally stores some customer credit card numbers in an insecure way. Those numbers become leaked to the public, and some customers suffer damages. The insurer would cover those damages, as well as any additional fines that are assessed.

Coverage for legal defense and civil fines or monetary penalties that an insured may be required to pay if investigated by a regulatory authority following a cyber event.

Example

Your customers’ sensitive data is leaked to the public. A government agency investigates you to assess if you have complied with all applicable privacy/data storage requirements. They find that you have not, and you are fined. The insurer would cover any legal defense costs, as well as the fine.

Coverage for lost revenues or expenses incurred due to an adverse media event following a cyber attack.

Example

Your corporate LinkedIn is taken over by a hacker and defaced with offensive messages. The insurer would pay for a public relations firm to remedy the situation, and for any lost revenues if sales decrease because of the defacement.

Coverage for losses due to criminals deceiving the insureds’ employees into taking damaging actions, such as initiating payments to fraudulent actors.

Example

An employee wires a vendor after receiving an urgent email from the CEO about payment being overdue. It turns out that the email was not from the CEO but from an impersonator. The insurer will cover the loss.

Coverage for an unplanned interruption, suspension, degradation, or failure in the service of computer systems which is not the result of a breach. System failures that could qualify include failures due to human error, power outages, or programming errors (restrictions apply).

Example

One of your IT associates runs a faulty update to your IT ecosystem knocking all your computers offline for four days. The insurer would cover the revenues lost while your business was offline.

Data recovery losses are the expenses associated with replacing or recovering damaged, lost, or stolen data and software.

Example

A cyber breach corrupts your customer database, making thousands of customer records unusable. The insurer would cover the expense of hiring a third party to restore your database to its previous state.

Ready to quote background waves
Ready to quote background waves

Ready to quote?

Stay safe whether your business uses or relies on tech

Getcyber.com

GETCYBER.COM

GetCyber is offered by Lightsail Insurance Services, a licensed Property & Casualty insurance agency in all 50 states and D.C.