none

FIVE TYPES OF COVER TO HAVE WITH CYBER INSURANCE

08-05-2018
by 
in 

Cyber hacking incidents are on the increase making cyber insurance ever more important argues commercial insurance broker John Catibog.

The Notifiable Data Breach scheme took effect on 22nd February and changed the way Australian businesses are expected to respond to a data breach. It is now mandatory for any business with annual revenues over $3 million to report an incident to the Office of the Australian Information Commissioner.

With the average cost per affected record at $139 (Ponemon Institute), the impact of a security breach can be crippling to a business when multiplied by the hundreds, if not thousands, of customer and supplier records they keep.

The cyber insurance market is still in its infancy in Australia, and not all cyber insurance products are the same. So it is important to understand what exactly is covered so there are no surprises when your system is compromised.

Here are five important covers to understand in a cyber insurance policy.

Notification and crisis management cover

The new laws require that notification of those likely to be harmed occur within 30 days. The cost to notify potentially hundreds of individuals in a short period of time can be significant.

A security breach will also need to be investigated to minimise further damage. Bad press and loss of customers trust will need to be managed after an incident is discovered, and so the services of IT forensics experts and public relations professionals may be required as a result.

The notification expenses and hiring of professionals are just some of the costs that this cover could help protect against.

Data recovery and business interruption cover

After a breach has occurred, there will be expenses to recover your data and restore your system. You may also lose significant income while your system is down.

After serving a waiting period, you could make a claim for the lost income you incur and the costs of getting back to business.

Extortion and social engineering costs

According to Telstra, 57% of organisations paid a cyber ransom demand but almost one-third did not recover the data.
Social engineering does not always involve computer hacking activities. An example might be a hacker calling and pretending to be a trusted associate to gain access to information or manipulating the transfer of funds.

Ransom payments and money lost by a company from fraudulent crimes could be claimed with this cover in place.

Third party liability cover

Considering that the average total cost for a data beach is $2.51 million, it is important to have adequate cover to protect against any lawsuits and damages that you may be liable to pay to those affected as a result of your security or privacy breach.

Multimedia cover

Multimedia cover includes protection for the costs incurred for defamation, copyright, piracy and errors and omissions with the use of multimedia content and social media platforms.

Look for these five essential covers in a cyber insurance policy to adequately protect your business before a data breach occurs.

Indagard Insurance Services
0456 456 085
www.indagard.com.au

 

Related news & editorials

  1. 06.08.2019
    06.08.2019
    by      In
    When compressing air liquid is also brought into the air stream. As the liquid cools, it condenses with the compressed air that is delivered directly to your tool or application.
    But liquid water in pneumatic systems creates problems. Bacteria growth, rust and corrosion affect how the machine... Read More
  2. 25.06.2019
    25.06.2019
    by      In
    With its constant craving for innovation and development, the software industry is almost certainly more focused on self-improvement than most. The never-ending series of meet-ups (where professional groups talk about issues relating to their specific field), the industry-level tech conferences –... Read More
  3. 18.06.2019
    18.06.2019
    by      In
    The Australian Defence Force does it. So does the Australian Tax Office and the Department of Human Services. And now, red teaming has spread to the corporate world with CIOs and CISOs increasingly turning to the practice to assess their organisations’ cyber resiliency.
    Red teaming exercises,... Read More
  4. 13.06.2019
    13.06.2019
    by      In
    New technologies and operational innovations are driving change in the mining sector, with emerging trends set to further shape the way the mining industry operates in 2019 and beyond.
    The business of mining is now high-tech and transformative with integrated automation, drones, advanced mining... Read More