{"id":169467,"date":"2022-07-29T15:15:26","date_gmt":"2022-07-29T15:15:26","guid":{"rendered":"https:\/\/ccbtechnology.com\/?p=169467"},"modified":"2023-03-29T19:00:12","modified_gmt":"2023-03-29T19:00:12","slug":"understanding-cyber-liability-insurance","status":"publish","type":"post","link":"https:\/\/ccbtechnology.com\/understanding-cyber-liability-insurance\/","title":{"rendered":"What is Cyber Liability Insurance?"},"content":{"rendered":"<p>Are you wondering if <a href=\"https:\/\/ccbtechnology.com\/asset\/things-to-know-about-cyber-insurance\/\" target=\"_blank\" rel=\"noopener\">Cyber Liability Insurance<\/a> is really necessary? Keep reading.<\/p>\n<p>A friend of mine works for a local industrial supply company that, within the last year, went from a small business to a mid-sized one as a result of an acquisition. She recently told me some company executives had received an email with a link to a document, and three of the group clicked the malicious URL. As a result, a hacker gained access to several areas of their systems, and their one-and-only IT person was being blamed.<\/p>\n<p>Sadly, she isn&#8217;t the first person I know who has been through a company breach. While companies of all sizes are targets, the small to midsize ones are experiencing the majority of successful attacks. As high as 55% of companies in this category have experienced a data breach, with 53% having multiple occurrences. Smaller organizations&#8217; elevated attack success rate is often simply due to insufficient budget for adequate cybersecurity tools and resources.<\/p>\n<p>Data breaches are becoming extremely costly to businesses and, in many cases, result in significant fines and legal fees. They not only hurt financially but cause damage to a business&#8217;s reputation and put customers and employees at risk. That&#8217;s why organizations are rapidly embracing cyber insurance to limit their liability and ease the burden of recovery in the event of cybercrime.<\/p>\n<h2><strong>What is cyber insurance?<\/strong><\/h2>\n<p>Regular business insurance does not cover cyber incidents or data breaches &#8211; they often exclude them. Cyber insurance policies generally start with business liability related to a data breach involving sensitive customer information and progress to more robust policies with additional coverage to help prepare, respond, and recover from a cyber-attack.<\/p>\n<h2><strong>What does cyber insurance cover?<\/strong><\/h2>\n<p>There are multiple layers to how cyber insurance policies are constructed, but four primary risk areas are considered in the process: privacy, security, operational, and service. Policies are generally written based on first-party and third-party coverage:<\/p>\n<p><strong>First-party covers costs related to:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Extortion demands<\/li>\n<li>Legal counsel<\/li>\n<li>Investigative\/forensic services<\/li>\n<li>Data or identity recovery services<\/li>\n<li>Lost income due to business interruption<\/li>\n<li>Public relations\/crisis management<\/li>\n<li>Fees, fines, and penalties<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Third-party covers costs related to:<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Damages to customers or partners impacted<\/li>\n<li>Settlement expenses due to lawsuits<\/li>\n<li>Costs related to litigation in regulatory inquiries<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Cyber insurance has no one-size-fits-all policy since company size, industry, revenue, and geographic location are all considerations. As with any insurance, policies, and pricing vary widely from one provider to the next.<\/p>\n<h2><strong>Why consider cyber insurance?<\/strong><\/h2>\n<p>Protecting your business with <a href=\"https:\/\/www.johnsonfinancialgroup.com\/security-center\/business-identity-theft-fraud\/\" target=\"_blank\" rel=\"noopener\">cyber liability insurance<\/a> will help you respond and recover quicker after an incident. In addition, your business may need coverage if you store or process sensitive data &#8211; like digital payments, medical or financial information, or personal data about customers. Ultimately, the question is, &#8220;What would happen to your business if you faced a cyber-attack today?&#8221;<\/p>\n<h2><strong>How does cyber insurance work?<\/strong><\/h2>\n<p>We&#8217;ve made it easy and put together a <a href=\"https:\/\/ccbtechnology.com\/asset\/cyber-insurance-checklist\/\"><u>complete guide<\/u><\/a> on what you need to know about cyber insurance and how to qualify. It includes a comprehensive checklist so your organization will be eligible for cyber liability insurance and better prepared in the event of a cyber-attack.<\/p>\n<p><\/p>\n\n<style>.wp-block-kadence-advancedbtn.kb-btns_19f088-02{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:flex-start;align-items:center;}.kt-btns_19f088-02 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns_19f088-02\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button{color:#ffffff;background:#2c92fa;font-size:15px;border-top-left-radius:29px;border-top-right-radius:29px;border-bottom-right-radius:29px;border-bottom-left-radius:29px;border-top:3px solid #2c92fa;border-right:3px solid #2c92fa;border-bottom:3px solid #2c92fa;border-left:3px solid #2c92fa;padding-top:12px;padding-right:21px;padding-bottom:12px;padding-left:21px;}.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:focus{color:#2c92fa;background:rgba(0, 0, 0, 0);border-top-color:#2c92fa;border-top-style:solid;border-right-color:#2c92fa;border-right-style:solid;border-bottom-color:#2c92fa;border-bottom-style:solid;border-left-color:#2c92fa;border-left-style:solid;}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button{border-top:3px solid #2c92fa;border-right:3px solid #2c92fa;border-bottom:3px solid #2c92fa;border-left:3px solid #2c92fa;}}@media all and (max-width: 1024px){.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:focus{border-top-color:#2c92fa;border-top-style:solid;border-right-color:#2c92fa;border-right-style:solid;border-bottom-color:#2c92fa;border-bottom-style:solid;border-left-color:#2c92fa;border-left-style:solid;}}@media all and (max-width: 767px){.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button{border-top:3px solid #2c92fa;border-right:3px solid #2c92fa;border-bottom:3px solid #2c92fa;border-left:3px solid #2c92fa;}.wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn_d047aa-d3.kb-button:focus{border-top-color:#2c92fa;border-top-style:solid;border-right-color:#2c92fa;border-right-style:solid;border-bottom-color:#2c92fa;border-bottom-style:solid;border-left-color:#2c92fa;border-left-style:solid;}}<\/style><a class=\"kb-button kt-button button kb-btn_d047aa-d3 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-outline kt-btn-has-text-true kt-btn-has-svg-false  wp-block-kadence-singlebtn\" href=\"https:\/\/ccbtechnology.com\/asset\/cyber-insurance-checklist\/\"><span class=\"kt-btn-inner-text\"><strong>Get the checklist<\/strong><\/span><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Are you wondering if Cyber Liability Insurance is really necessary? Keep reading. A friend of mine works for a local industrial supply company that, within [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":169477,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-169467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts\/169467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/comments?post=169467"}],"version-history":[{"count":0,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/posts\/169467\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media\/169477"}],"wp:attachment":[{"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/media?parent=169467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/categories?post=169467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ccbtechnology.com\/wp-json\/wp\/v2\/tags?post=169467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}