Kochie’s Business Builders Explains Cyber Insurance

Kochie's Business Builders

Kochie’s Business Builders Explains Cyber Insurance

To help explain cyber insurance, Steadfast have partnered with Kochie’s Business Builders to produce this short explainer video.

30% of small businesses in Australia experiencing a cybercrime incident

Most cyber attacks are caused by human error the average cost of business was a huge $276,000 in 2015 with over 30% of small businesses in Australia experiencing a cybercrime incident

Why do I need it?

If your business has a website or electronic records, you’re vulnerable to cyber hackers. In fact, it’s likely that your business will suffer a cyber attack at some stage. A cyber attack could cost your business more than money. It could also threaten your intellectual property and put customers’ personal information at risk – which could damage your reputation.
Kochie's Business Builders
What usually isn’t covered?

Exclusions and the excess you need to pay can vary greatly depending on your insurer. Policies generally won’t include cover for:

  • Damage to computer hardware
  • Criminal actions committed by you or your business
  • A cyber attack based on facts of which you were aware
  • Criminals using the internet to steal money from you

Compare Cyber Insurance Quotes from leading Australian Insurers like AIG, Allianz, Brooklyn Underwriting, CGU, Chubb, Dual, Emergence and Zurich.

 

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Could a cyber risks cause disruptions to critical business infrastructure

Cyber Risks

Cyber Risks to critical business infrastructure

When a scheduled flight of a wide-body airliner is cancelled it can cost the airline up to $43,000. So you can imagine what kind of day executives at LOT, the Polish national airline, were having last year when 20 flights were cancelled after computers that issue its flight plans were breached.

“The aviation industry’s growing reliance on data networks, and onboard computer and navigation networks, is rendering it increasingly vulnerable to cyber risks,” says Erlend Munthe-Kaas of Bloomberg Intelligence. “Airlines rely on computers for almost every aspect of operations. As a result, cyber incidents can have devastating consequences, including business interruption and loss of reputation.”

“There’s beginning to be a shift beginning to educate businesses to see the wider, deeper cyber risks picture that in many cases has gone unacknowledged.”

Think of it as cyber creep. The risks aren’t just about protecting your customer’s data, although that remains important. They are insinuating themselves into every nook of your business, creating the possibility of mass disruption to operations and critical infrastructure. As the world becomes more connected, and businesses rely more on machine-to-machine communication and automated manufacturing, the cyber risks pile up. One day, production might grind to a halt. Critical transactions might not take place. Shipments could be steered to incorrect destinations. Planes might not take off.

Continue reading Could a cyber risks cause disruptions to critical business infrastructure

Cyber Insurance Know Cyber Risk

Cyber Risk

cyber-risk

Cyber Insurance Know Cyber Risk

We live in a modern, connected world and from our computers at work, to our laptops, tablets, phones and even our TVs, we’re vulnerable online.

While it’s easy to think you would never be the victim of a cyber-attack, studies are showing that it is happening more and more every day, which is why we’ve put together these resources on how you can protect yourself, your family and even your business online.

Trolls and Trojans – thievery in the digital age

In the vast world of the online there are things you need to do to keep your information safe.

Cyber Insurance

Did you know that almost seventy per cent of Australian businesses have experienced a cyber-attack in the last 12 months? With technology being so important to the way we work and with more attacks predicted in the near future, cyber insurance isn’t just a nice-to-have, it’s a necessity.

Cyber insurance for small businesses

Information for small business owners on cyber risk and cyber insurance.

Privacy and your business

Some information on how the new Privacy Act will affect your business.

5 ways to protect yourself online

Some helpful hints to protect your personal information when online.

7 Ways to hack proof your password

Here are seven tips on how to make your internet passwords stronger.

Learn how to keep track of your digital footprint

Information on how to protect yourself online.

Don’t put up with cyberbullying

Info on how to beat the cyber bullies.

How can you keep your kids safe online?

Information on how to keep your children safe from online predators.

10 Silly things people do with their smartphones

How many silly things do you do with your smartphone?

BYOD is not just a BBQ buster

Tips on how to prevent security issues with your mobile device.

Five tips to protect yourself from webcam hackers

Stop hackers from breaking into your home while not even there.

Social media – it’s harmless…right?

The pitfalls of social media, and how you should protect your privacy.

Cyber Security. Evolved.

This short video highlights how in less than 300 seconds you can experience the speed and intensity of a cyber attack.

Other resources cyber risk

Find more information on cyber security at:

Source knowrisk.com.au

Do you need to know more about Cyber Insurance speak to one of Insure 247’s brokers on 1300 046 787

1300-Insure

Cyber Risk

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

3 steps you can take to manage cyber risk

Manage cyber risk

Manage cyber risk

Internet usage continues to rise across the globe. Along with this, comes an increase in cyber-crime, which according to a report by Mcafee, is estimated to have cost the global economy USD$445 billion in 2013 . In Australia, the cost is estimated at 0.08% of GDP per year, or approximately AUD$1.28 billion. The Mcafee report attributes this partly to the fact that, ‘Cybercrime produces high returns at low risk and (relatively) low cost for the hackers.’

In addition to taking out cyber insurance, businesses can proactively mitigate the cyber risk and a cyber-attack by undertaking a range of measures including:

  • Implementing business-wide cyber-risk management
  • Seeking external specialist advice
  • Identifying the type of data that needs to be secured

Don’t just leave Cyber Risk to IT

Cyber-risk management should not only be considered the domain of the IT department. It affects the entire business and from the board down, the business needs to think about how to manage that risk and how to develop contingency plans if something does go wrong.

Seek external specialist advice
The increasing variety and sophistication of cyber-crimes mean that independent specialist external advice on securing systems is essential for businesses. It is very rare that a business will have sufficient internal resources to address this problem fully both prior to and certainly following the loss.

Identify the type of data that needs to be secure
Firms should conduct an audit of their network to ensure sensitive records have an appropriate level of security. Companies in the business of dealing with sensitive financial that hold personal information including name, address, date of birth – the very kind of data that could be the target of an attack.

 

Cyber Insurance

Allianz currently offers cyber insurance for the top end of the market through AGCS and we are working on the release of a cyber insurance product tailored specifically to the needs of SME customers. We expect to make it available to the market by the end of the year.
1 Reference

Source allianzinsight.com.au

Speak to one of Insure 247’s brokers on 1300 046 787

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrant the accuracy of any information contained therein, readers should make their own inquiry’s before relying on information in the stories Terms of Service

Cyber Insurance Comparison

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation, and needs

Cyber Risk

 

Cyber risk is bigger than an IT issue

Cyber risk is bigger than an IT issue

One thing is becoming clear about cyber risks: the problem is much bigger than any organization’s information technology department.

Background

My background as an IT leader and information security professional before I joined XL Catlin gives me a good vantage point on how businesses can make the mistake of thinking that cyber risk begins – and ends – with their technology operations. Regardless of a company’s size and resources, IT operations play a critically important role in cybersecurity. But the total cost of cyber risk affects the entire enterprise, and a cyber incident frequently causes problems that no IT professional, however talented, can solve.

Business continuity, third-party liability, reputational damage and regulatory compliance – those are beyond the purview of IT. A well-run IT department can minimize downtime and get systems back up, which is critical. The value of data and the cost of a disruption, however, are ultimately determined by the data owners in the business operations. While a system shutdown can be catastrophic for some organizations, business interruption and data recovery insurance are available to mitigate that risk. Regulations regarding cyber security are evolving, and insurance is available to manage that uncertainty too.

But the business itself must communicate with its employees, customers, investors and perhaps regulators, after an incident. If a data breach has occurred, a forensic investigation and notification of affected parties are likely required. A strong, unified message is critical to convey, and that is best delivered with the help of senior executives and crisis communication professionals. One of the valuable benefits of cyber insurance is access to expert resources, from PR to forensics to IT specialists, who can quickly come in to assist.

The complexity of responding to a cyber incident and communicating with stakeholders are strong reasons to have a team, such as an executive control group. The composition of such a team depends on the size of the entity and the nature of its business. In larger organizations, it likely will include enterprise risk management staff as well as C-level leaders, such as the chief technology or chief information officer. For smaller and midsize organizations, the team might include the general counsel, chief operating officer and the head of IT, for example. Regardless of the specific titles, the functions that need to come together to discuss cyber risk include risk management, operations, IT, legal, marketing and communications. Ideally, a cyber risk steering committee or group is convened to ensure that all relevant areas of the organization are represented and kept informed. The job of managing cyber risk shouldn’t fall to one person, however; a cyber risk team can ensure that the entire organization understands the risk and adjusts procedures accordingly.

It’s important to think about cyber insurance as similar to property or commercial general liability – as a form of protection that your organization needs to continue operating.

Midsize companies have particular challenges when it comes to cyber risk. Often they have fewer IT resources, which makes them attractive targets for cyber attacks. Statistics on cyber attacks bear this out. The 2015 Cyber Claims Study from risk assessment firm NetDiligence found that 71% of cyber claims came from organizations with less than $2 billion in revenue, and 56% came from those firms with less than $300 million.

Many midsize companies also have contractual requirements with bigger organizations that increase their need for high cyber insurance limits. Based on their own perceived exposure, a midsize organization might not think it needs to purchase a lot of cyber insurance coverage, but that situation can change if a business relationship requires it. The lesson here is to look closely at your business and all risks relating to your systems and networks. How long could your firm afford to remain offline, if a cyber incident disrupted your IT operations? Could your company lose revenue or customers if that happened? Would you be able to meet your obligations to business partners?

There is a lot to understanding and managing cyber risk. A team approach is a good way to cover the bases, as well as working with expert resources and strong insurance partners to help protect your business.

About the Author

Sean M. Donahue is assistant vice president and underwriter, Cyber and Technology Insurance, at XL Catlin.

Source XL Catlin

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

Are Home Networks a Cyber Risk for Your Business?

Are Home Networks a Cyber Risk for Your Business?

It’s not uncommon for staff to take home a company laptop and connect it to their domestic network. That network may be protected by a firewall but internally it is still vulnerable. For example, other devices may be connected, such as family members’ PCs and smartphones, as well as smart TVs, DVD recorders, child monitors, CCTV systems, and even fridges. All of these are capable of being hacked.

Infections From Other Networks

A company laptop may become infected by a virus initiated from another network-connected device. There have been cases of someone else, perhaps a child, using the laptop to surf the Internet unsupervised and allowing the machine to be infected by malware. The staff member then unwittingly spread the infection when the laptop was reconnected to the company network.

The same can apply to smartphones that are connected to both home and company networks.

Cyber Risk from smart TVs and other domestic wi-fi-capable devices

The manufacturers of smart TVs and other domestic wi-fi-capable devices do not usually update their software outside that model’s maintenance cycle, so older devices will not get updates at all. Any infection will spread though the home network.

The best way to avoid contaminating a company network is to insist that strong anti-malware software is installed on every device that may be connected.

Staff should also be encouraged to run two separate networks on their routers. One network should then be used exclusively for the company laptop or smartphone; the other for everything else.

Source: Steadfast

[pardot-form id=”489″ title=”Cyber Insurance”]

Cyber Insurance ComparisonPlease note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

 

 

Insure Against Cyber Risk

In our continuing series on Cyber Risk, we thought it would be interesting to see what the potential cyber risk is with the new Australian Privacy Principles and its implications for small business.

Are we prepared

90 % of private companies don’t have insurance against cyber risk,  that’s one of the findings in Chubb 2013 Private Company Risk Survey. That means the uninsured companies will have to foot the bill if the are found liable for loss as a result of cyber crime, or data breach.

So if your cloud computing company is breached you may find your self ultimately liable for the loss of data .

Australian Privacy Principles

The National Privacy Princibles (NPP) will be replaced by the Australian Privacy Principles (APPs) on 12 March 2014 the change includes civil penalty regime for breaches of privacy. Click here for a copy of the privacy fact sheet

APP Privacy principle  8—cross-border disclosure of personal information, will require your clients information held on servers in countries is at least substantially similar to the way in which the Australian Privacy Principles protect the information.

Where is your data held? And how does your cloud company protect it?

You could simply call Salesforce, Google, Jive Software, Demandware or Xero and ask which country your data is stored in or backed up in, as long as that country meets the similar privacy standard to Australia your fine.

Steps that may help your company

  • Develop an Incident Response Plan (IRP)
  • Encrypt Portable devices
  • Assess cloud services providers’ data security
  • Get Cyber Liability Insurance

If you are still unsure, speak to a specialist, get them to review your potential risks and possible mitigation.

Steve Sloan
steve-sloan-insure247

Steve is a licensed insurance broker and marketer. He is an internet insurance pioneer in Australia.

Cyber Risk Trends

Where is your exposure
Cyber Threat

Any advice that may have been given is general advice only, please be aware that we have not taken into consideration your needs, objectives or financial requirements. Before deciding to purchase a financial product you should consider the appropriate Product Disclosure Statement to ensure the product is suitable for your needs.

First Published on GreatChoice