CGU Cyber Defence

CGU Cyber Defence

CGU Cyber Defence Product Review

CGU Cyber Defence Protects your business against cyber exposures that can impact your business from direct costs to your business, and claims from third parties. Costs associated with defending cyber claims are also covered. CGU’s incident response team is on alert and ready to take action 24/7.

Key features:

  • All subsidiaries covered including new and former subsidiaries
  • Advancement of defence costs
  • Breach Coach helps you understand what needs to be done
  • Worldwide territorial cover no matter where the attack originated from
  • Covers you for privacy breaches of data you capture and held by service providers (e.g. Cloud, ISP’s etc)
  • Free 1 Hour cyber consultation to assess risk mitigation strategies
  • 24/7 Incident response team
  • Public relations consultancy costs to protect the personal reputation of senior executives

CGU Cyber Defence at a glance

Privacy Breach

Privacy protection against third party claims for loss of;

  • Personal Information
  • Commercially Confidential Information
  • Employee Information
  • Information held by Service Providers (e.g. Cloud, ISP’s etc)
  • Defence costs covered

System Damage

Cover for lost, damaged or destroyed;

  • IT systems,
  • IT records / data
  • Includes retrieving, repairing, restoring or replacing data, systems or hardware
  • Also, includes external IT forensic or security consultants costs

Business interruption

  • Cover for loss of profits due to a Cyber Event
  • No indemnity period restriction
    • Subject to a time excess of 12 hours
  • COMPUTER VIRUS & HACKING
  • Cover for liability arising from hacker attack or virus
  • Covers loss or theft of your data or data for which you are responsible
  • Attacks by employees and third parties covered
  • Includes loss by phishing emails or Denial of Services attacks

 

Computer crime (OPTIONAL EXTENSION)

Cover for crime losses (sub limit applies) including;
– Loss of money
– Covers loss of money from Service Providers systems
– Loss caused by rogue employee or third party

Multimedia Liability

  • Protection against libel, slander or defamation
  • Cover includes infringement of copyright, trademarks & trade names
  • Covers your defence costs and third party’s costs
  • Covers all your marketing material (digital or print)

Breach Of E-Commerce Statutory Duties

  • Covers breach of statutory duty from eCommerce relating to security & management of data
  • Defence costs and compensation payable to third parties

Extortion

  • Covers payment of ransom
  • Costs of negotiating/mediating a security threat
  • Covers crisis management costs to resolve security threats

Brand protection

  • Public relations consultancy costs to protect the
    company brands.

Personal Protection

  • Public relations consultancy costs to protect the personal reputation of senior executives

Privacy Fines & Investigations

  • Cover includes fines and penalties incurred by you due to a privacy breach
  • Includes cover for your defence and investigation costs

Privacy Breach Notification & Loss Mitigation

  • Covers your breach costs including credit monitoring, identity theft monitoring, data restoration and forensic costs
  • Includes your legal costs
  • Access to call centre support services
  • Covers actual or suspected privacy breach

Reward Cover

  • Covers reward expenses to secure conviction of perpetrators of hacking attacks
  • Include payment of money or property for securing a conviction

Download a Brochure PRIcyber_defence_productoverview

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

 

 

Kochie’s Business Builders Explains Cyber Insurance

Kochie's Business Builders

Kochie’s Business Builders Explains Cyber Insurance

To help explain cyber insurance, Steadfast have partnered with Kochie’s Business Builders to produce this short explainer video.

30% of small businesses in Australia experiencing a cybercrime incident

Most cyber attacks are caused by human error the average cost of business was a huge $276,000 in 2015 with over 30% of small businesses in Australia experiencing a cybercrime incident

Why do I need it?

If your business has a website or electronic records, you’re vulnerable to cyber hackers. In fact, it’s likely that your business will suffer a cyber attack at some stage. A cyber attack could cost your business more than money. It could also threaten your intellectual property and put customers’ personal information at risk – which could damage your reputation.
Kochie's Business Builders
What usually isn’t covered?

Exclusions and the excess you need to pay can vary greatly depending on your insurer. Policies generally won’t include cover for:

  • Damage to computer hardware
  • Criminal actions committed by you or your business
  • A cyber attack based on facts of which you were aware
  • Criminals using the internet to steal money from you

Compare Cyber Insurance Quotes from leading Australian Insurers like AIG, Allianz, Brooklyn Underwriting, CGU, Chubb, Dual, Emergence and Zurich.

 

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

How can I protect myself against the WanaCry Ransomware?

Ransomware

WanaCry Ransomware

To best avoid infection of this sort we advise that the following steps are taken to maximise your system protection.

How can I protect myself against the WanaCry Ransomware?

You can protect yourself against the ransomware in the following ways:

  • Ensure you have a valid corporate Antivirus subscription
  • Ensure your Antivirus is up to date
  • Ensure that port 445 is closed on your network
  • Ensure you are up to date with all Microsoft updates on your server and workstations
  • Back up your data with an external hard drive or to the cloud

Please contact your local IT Support if you are unsure if you are protected, or may have the ransomware on your computer.

Need Cyber Insurance?

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrant the accuracy of any information contained therein, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Australian cyber threat to the private sector

Cyber Threat

The Cyber Threat to Australian Business may be larger than first thought with many Australian businesses refusing to report breaches due to concerns the disclosure may adversely affect their reputation or create legal or commercial liabilities.

In the second of the Australian Cyber Security Centres cyber threat report

Extract from  ACSC Threat Report 2016:

Australian industry is persistently targeted by a broad range of malicious cyber activity, risking the profitability, competitiveness and reputation of Australian businesses. The spectrum of malicious cyber activity ranges from online vandalism and cybercrime through to the theft of commercially sensitive intellectual property and negotiation strategies.

The ongoing theft of intellectual property from Australian companies continues to
pose significant challenges to the future competitiveness of Australia’s economy. In
particular, cyber espionage impedes Australia’s competitive advantage in exclusive
and profitable areas of research and development – including intellectual property
generated within our universities, public and private research firms and government
sectors – and provides this advantage to foreign competitors.

The ACSC’s visibility of cyber security incidents affecting industry and critical infrastructure networks is heavily reliant on voluntary self-reporting.
Some companies may be hesitant to report incidents to the government due to concerns the disclosure may adversely affect their reputation or create legal or commercial liabilities. For example, in some cases victim organisations have sought legal advice before reporting an incident.

Many cyber security incidents across the private sector are undetected or unreported. Increased reporting of cyber security incidents by the private sector would subsequently increase the ACSC’s knowledge of cyber adversaries who target Australian industry and critical infrastructure, and the methods they employ. This knowledge would further enable the development of cyber security advice and mitigation strategies.

The ACSC is making a dedicated effort to engage industry on cyber threats and associated mitigation strategies through a process of sustained engagement. However, the private sector’s ability and willingness to recognise the extent of the cyber threat and to implement mitigation strategies varies considerably across and within sectors. Generally, companies that have been extensively targeted or compromised are more likely to view the business risks associated with the cyber threat as sufficient to warrant investment in cyber security.

Those without direct experience of being targeted or a victim may not be aware of the potential economic harm malicious cyber activity can cause their businesses, do not
understand the value of the data they hold, and cannot conceive why they would be targeted.

 

Australian Cyber Threat

Between July 2015 and June 2016, CERT Australia responded to 14,804 cyber security incidents affecting Australian businesses

Between July 2015 and June 2016, CERT Australia responded to 14,804 cyber security incidents affecting Australian businesses, 418 of which involved systems of national interest (SNI) and critical infrastructure (CI).

CERT Australia relies heavily on the voluntary self-reporting of cyber security incidents from a wide variety of sources throughout Australia and internationally and therefore does not have a complete view of incidents impacting Australian industry.

Sources: www.acsc.gov.au

Need Cyber Insurance?

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

 

If Hackers Steal Data Who Pays

It’s Just Hackers

In 2014 Hackers stole data from Yahoo that resulted in the details of 500 million users personal details including names and emails, as well as “unencrypted security questions and answers” be taken.

The breach damaged the trust in the brand, required Yahoo to publicly disclose the cyber-breach and advise all its users to change their passwords.

However, not all users changed their password and some are still reporting loss of data

The Cost of a Cyber Breach*

The costs of a data leak or data loss are rapidly accruing, with the total average cost per data breach within Australia now sitting at $AUD2.82 million, according to a 2015 study from IBM and Ponemon Institute. Moreover, the average cost per lost or stolen record has reached $AUD144, while the average number of breached records per incident is just under 20,000.

 

But I don’t have that many clients

The high-profile breaches recently included MySpace (359 million), LinkedIn (164 million) and Adobe (152 million), however, the hacking of a Gold Coast doctor in 2012 cost $4000 dollars.

Report a cyber incident

The Australian Signals Directorate (ASD) provides government with a greater understanding of cyber threats, and the coordination of whole-of-government operational responses to cyber incidents. The Cyber Security Incident Reporting (CSIR) scheme assists ASD with this role.

The Australian Government Information Security Manual (ISM) states agencies must report cyber security incidents to ASD. Cyber security incident reports are the basis for identifying and responding to cyber security incidents across government.

Reporting cyber security incidents helps ASD to develop a threat environment picture for government systems, and assist other agencies who may also be at risk. Cyber security incident reports are also used for developing new policies, procedures, techniques and training measures to help prevent future incidents.

The types of cyber security incidents agencies should report to ASD include:

  • suspicious or seemingly targeted emails with attachments or links
  • any compromise or corruption of information
  • unauthorised access or intrusion into an ICT system
  • data spills
  • theft or loss of electronic devices that have processed or stored Australian government information
  • intentional or accidental introduction of viruses to a network
  • denial of service attacks
  • suspicious or unauthorised network activity.

To report a cyber incident:

Sources: http://www.asd.gov.au/infosec/reportincident.htm *http://www.cso.com.au/

Need Cyber Insurance?

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Zurich's Digital Resolve Response

zurich_Logo_4c [Konvertiert]

Zurich’s Digital Resolve Response what is it?

Insurers are busy preparing for a explosion in Cyber Insurance clients, but with clients come claims, and for some clients the insurers response to an event will set the standard.

One cyber insurer Zurich has put together a team of specialist companies to make a panel of first respondents to a cyber event, these specialists legal teams, PR teams, digital forensics teams, incident response, and security sciences, investigation, eDiscovery and due diligence.

What is DigitalResolve and how does it work

It can help to:

  • Locate and rectify the source of cyber attacks, failures or breaches
  • Protect businesses from further attacks or disruptions
  • Assess financial losses
  • Protect a business’s brand/reputation
  • Ensure compliance with local regulations
  • Notify victims of data breaches
  • Negotiate ransomsUndertake credit monitoring
  • Recover losses from negligent third parties

Zurich Digital Resolve have access to experts to assist in the following areas:

  • Forensic Accountants
  • Legal Advice
  • Public Relations
  • IT Forensic loss assessment
  • Kidnap and ransom response teams
  • Cyber Extortion Experts
  • Identity Protection
  • Credit Monitoring
  • Public Notification
  • Regulatory No

 

 

Zurich Digital Resolve Group Include

Mandiant

Mandiant, a FireEye company, is the leader in helping organizations respond to and proactively protect against advanced cyber security threats.

“Mandiant is at the forefront of helping organizations rethink how to prepare for security breaches.”

– Michael Chertoff, Former Secretary of Homeland Security

Stroz Friedberg

Stroz Friedberg is a specialized risk management firm built to help clients solve the complex challenges prevalent in today’s digital, connected and regulated business world.

DLA Piper

DLA Piper is a global law firm with lawyers located in more than 30 countries throughout the Americas, Europe, the Middle East, Africa and Asia Pacific, positioning them to help companies with their legal needs anywhere in the world.

Norton Rose

Norton Rose Fulbright is a global law firm.

FleishmanHillard

FleishmanHillard in Australia is part of a global marketing and communications network operated by one of the industry’s leading PR agencies.

Crawford

Crawford & Company is the world’s largest independent provider of claims management solutions to insurance companies and self-insured entities.

If an incident occurs, clients can call a hotline 24/7, 365 days a year. An Incident Manager will be appointed to handle their case and will select a team of experts to act on the client’s behalf. The team will comprise everyone from IT forensic experts and consultants, to legal experts in data protection and cyber breaches, to PR consultants who can help mitigate any reputational damage.

Like to know more


1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Cyber crime and your small business

Cyber Crime

It might be easy to dismiss cybercrime as completely irrelevant to your business on account of its small nature — who would actually take the time to exact a cybercrime against your small business when they could be hitting the big leagues, right?

The reality is that cyber crime is believed to cost Australian businesses — of all sizes — around $4.5 billion a year, but despite that, so few businesses are insured against it.
In fact, small businesses have been the slowest to protect against cyber crime, making them more vulnerable to the threat.

When you consider that almost all businesses have an internet presence or make use of the internet in their everyday business dealings, it becomes pretty clear that cybercrime presents a risk to even the smallest businesses.

Pretty much every business — be it big or small — will be reliant on data to some extent. Such data can include employee profiles, private corporate information, any identifying numbers (like Medicare and driver’s license numbers), and information of a personal nature about customers, budget details, and credit card information. The consequences of such data being breached and made public can be wide-ranging.

So, let’s have a look at cybercrime and insurance a little further so that you can make a more informed decision about whether or not it’s worth looking into for your business.

What is a cybercrime?

In basic terms, cybercrime is a blanket term for any type of activity of a criminal nature that is carried out using a computer and/or the internet.

Cybercrime includes all of the following:

  • Identity theft
  • Cyberstalking
  • Use of malware
  • Use of viruses
  • Computer and network hacking
  • Online scams
  • Phishing scams
  • Fraud
  • Information theft
  • Extortion

When you consider that almost all businesses have an internet presence or make use of the internet in their everyday business dealings, it becomes pretty clear that cybercrime presents a risk to even the smallest businesses. Criminals don’t necessarily need to hack your systems to commit cybercrime; if they manage to get their hands on a laptop, iPad or mobile phone belonging to your business (either because it has been stolen or left unattended), they have easy access to your information and are able to more easily commit their crimes.

How will cybercrime affect my business?

The ways in which cybercrime can affect your business are actually a lot more expansive than one may have initially thought and are usually not contained to a defined period of time; rather, the effects tend to be ongoing and costly.

Beyond the general business interruption, a breach of data that results in personal information of customers or employees being made public can result in significant fines, legal fees, and costs associated with investigating the breach and notifying customers of the potential effects it may have on them.

Consider also the loss of business. Your existing customers are unlikely to continue being your customers if their personal information becomes public — and even if a cybercrime committed against your business doesn’t directly affect them, the fact any crime was able to be committed at all will leave them feeling uneasy.

A cybercrime against your business could also affect your reputation and drive away potential customers who may think twice about dealing with you given your company’s cybersecurity shortcomings.

Can’t software keep my business safe from a cyber attack?

Yes, there are certain things you can do to help minimise the risk of a cyber attack and these things include all of the following:

  • Reputable anti-virus programs
  • Secure data back-up
  • Firewall technology
  • Data encryption
  • Laptop and mobile security
  • Adequate social media policies

If all of this sounds like gibberish to you, don’t feel bad. The reality is that most businesses aren’t aware of the extent to which they need to have such things in place to protect themselves and their information, which often leaves them incredibly vulnerable to cybercriminals.

And, unfortunately, even if you do have all the right systems and software in place, your business is still at risk — particularly if your business involves the collection of customer information, including personal, credit card and bank details.

What does cyber insurance cover?

Although policies will vary between insurers, a typical cyber insurance policy is designed to help you with both preventing breaches in the first place and dealing with them if and when they occur. Cyber insurance policies usually include the following:

  • The cost of restoring or recreating electronic data following a breach or leak
  • Forensic services to investigate a breach
  • PR coaching in the event a breach harms your business’s reputation
  • Assistance guarding against data breaches, hacking and employee error
  • Guidance on how to respond to a breach
  • Funds to cover the adverse financial effects related to a breach
  • Funds to cover any fines that might be payable following a breach

Small businesses have been the slowest to protect against cyber crime, making them more vulnerable to the threat.

Source Steadfast

Speak to one of Insure 247’s brokers on 1300 046 787

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Insider and Privilege Misuse

Cyber Claim Scenario – Insider and Privilege Misuse

An Australian logistics/freight forwarding and warehousing, with a 30M turnover, had a disgruntled ex subcontractor who hacked the company’s network multiple times with the intention of disrupting business operations.  As a result of the attacks, the Insured’s network was down for 21 days.

As the company was insured, the insurer use the services of a cyber loss adjustor, who was appointed to locate and rectify the main cause of the disruption and to facilitate the restoration of the entire network.

Have your company got a spare $280,000?

The claim resulted  in a payments of $280,000 made up of $110,000 in Defence Costs and $170,000 paid out in relation to IT expenses and lost income for the time the network was down.

Can you insurer against a Insider and Privilege Misuse Loss?

Some insurers offer Cyber Insurance to cover Insider and Privilege Misuse.

However it’s not a in all policies, if your unsure speak to one of Insure 247’s brokers on 1300 046 787

Source: Dual

 

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Cyber Claim Scenario – Denial of Service Attack

Cyber Claim Scenario – Denial of Service Attack (DoS attack)

In January 2012, Australia’s second-biggest online broking business, ANZ Bank’s ETrade, was forced to shut down over the New Year period by a denial of service attack launched from overseas. Following the attack, access to the site was unavailable for some customers for nearly two weeks

Former Woodside Petroleum CEO Don Voelte warned in 2011 that cyber attacks were a major concern and that the company had been attacked “from everywhere”, particularly Eastern Europe, Russia and China.

Cyber Insurance

What is a Denial of Service Attack?

A denial of service (DoS) attack is an incident in which a user or organization is deprived of the services of a resource they would normally expect to have. In a distributed denial-of-service, large numbers of compromised systems (sometimes called a botnet) attack a single target.

Although a DoS attack does not usually result in the theft of information or other security loss, it can cost the target person or company a great deal of time and money.

Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services.

A denial of service attack can also destroy programming and files in affected computer systems.

In some cases, DoS attacks have forced Web sites accessed by millions of people to temporarily cease operation.

Can you insurer against a Denial of Service Attack?

Some insurers offer Cyber Insurance to cover Denial of Service Attack.

However it’s not a in all policies, if your unsure speak to one of Insure 247’s brokers on 1300 046 787

Source AIG

 

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Identity Theft – Know the Perpetrators

Identity Theft – Know the Perpetrators

Remember that awful Sandra Bullock movie? No, not Speed 2 – although that was outrageously bad. We’re talking about The Net. It’s a film from the nineties about a computer programmer that stumbles on a government conspiracy and has her identity stolen and replaced. Sure, the technology is laughably out of date – it was filmed in 1995 – but it was one of the first films to deal with technology-based identity theft.

About Identity Theft

Identity theft is growing at a rate of about 15-20 per cent each year, which means every one of us could be a potential victim, regardless of our age, nationality or status. Financial loss is only a part of how identify theft can affect you; there’s also the risk of reputational damage or damage to your credit rating which could take months and sometimes years to repair.

Know the Perpetrators

But who are the people behind these unseen crimes? Who are you at risk from? This infographic by Hotspot Shield shines the light on three types of crooks behind identity theft and shows us their nefarious methods of obtaining your personal information and how you can limit your risk of becoming the next victim of identity theft.

Source: knowrisk.com.au

identity-theft-infographic_small

Speak to one of Insure 247’s brokers on 1300 046 787

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs