February 16, 2021



 Are you concerned about your business being targeted by hackers using ransomware?  You should be, especially if you are a small business.  30% of ransomware attacks in 2020 happened to businesses with 11-100 employees.  Healthcare businesses made up 18% of businesses attacked.  Small businesses are targeted precisely because they are small and are less likely to have security checkpoints and generally have flat network structures.  The best way to protect your business is using multifactor authentication.  This risk management technique can prevent up to 98% of email compromises.  Another way to protect your business is to procure cyber liability insurance that extends coverage for ransomware attacks.  Let us help you navigate the cyber insurance marketplace.
Published in Blog

Cyber liability conversations are commonplace these days.  We are often discussing the latest breach without giving it a second thought.  There is no shortage of dialogue, media, and opinions regarding the topic.  Where to start is the big question.  Equipping ourselves with the knowledge is a great start to developing a plan to secure our data.  Cyber Liability insurance is there to help pay for the damages as a result of a breach but how do we start creating a plan to secure our data.  

Travelers has provided a list of 9 key elements to create a good data security plan. 

 Essential Elements of a Data Security Policy 


1. Safeguard Data Privacy:  Employees must understand that your privacy policy is a pledge to your customers that you will protect their information. Data should only be used in ways that will keep customer identity and the confidentiality of information secure. Of course, your employees and organizations must conform to all applicable laws and regulations.

2. Establish Password Management: : A password policy should be established for all employees or temporary workers who will access corporate resources. In general, password complexity should be established according to the job functions and data security requirements. Passwords should never be shared.

3. Govern Internet Usage: Most people use the internet without a thought to the harm that can ensue. Employee misuse of the internet can place your company in an awkward, or even illegal, position. Establishing limits on employee internet usage in the workplace may help avoid these situations. Every organization should decide how employees can and should access the web. You want employees to be productive, and this may be the main concern for limiting internet usage, but security concerns should also dictate how internet guidelines are formulated.

4, Manage Email Usage: Many data breaches are a result of employee misuse of email that can result in the loss or theft of data and the accidental downloading of viruses or other malware. Clear standards should be established regarding use of emails, message content, encryption and file retention.

5. Govern and Manage Company-Owned Mobile Devices: When organizations provide mobile devices for their employees to use, a formal process should be implemented to help ensure that mobile devices are secure and used appropriately. Requiring employees to be responsible for protecting their devices from theft and requiring password protection in accordance with your password policy should be minimum requirements

 6..Establish an Approval Process for Employee-Owned Mobile Devices: With the increased capabilities of consumer devices, such as smart phones and tablets, it has become easy to interconnect these devices to company applications and infrastructure. Use of these devices to interconnect to company email, calendaring and other services can blur the lines between company controls and consumer controls. Employees who request and are approved to have access to company information via their personal devices should understand and accept the limitations and controls imposed by the company.

7. Govern Social Media: All users of social media need to be aware of the risks associated with social media networking. A strong social media policy is crucial for any business that seeks to use social networking to promote its activities and communicate with its customers. Active governance can help ensure employees speak within the parameters set by their company and follow data privacy best practices.

8. Oversee Software Copyright and Licensing: There are many good reasons for employees to comply with software copyright and licensing agreements. Organizations are obliged to adhere to the terms of software usage agreements and employees should be made aware of any usage restrictions. Also, employees should not download and use software that has not been reviewed and approved by the company.

9. Report Security Incidents: A procedure should be in place for employees or contractors to report malicious malware in the event it is inadvertently imported. All employees should know how to report incidents of malware and what steps to take to help mitigate damage.


To read the full article- Travelers-9 Key Elements  

For you own cyber liability insurance, please call us at 801-733-8500 or email .  

Published in Blog

Experts agree that it is just a matter of time before your business experiences a cyber liability breach.

Cyber liability is an all-encompassing term that includes exposures to extortion, funds transfer fraud, data destruction, HIPAA violations, breach of personal identifiable information and payment card industry fines and assessments. Cyber criminals are capitalizing on the potential gains by hacking, stealing and selling personal and company information. That is not the only risk. Many cyber liability breaches happen due to human error, and yes, cyber liability policies contemplate that type of breach in their coverage forms. If you think you are impervious to a cyber liability claim, think again. These types of claims are generally large enough to devastate a company regardless of size. According to the Ponemon Institute in 2017 the average cost of a cyber breach is $19 per record and $457,691 per breach. For more information read the pdfPonemon Institute's 2017 Study. Our agency is able to assist you with the right cyber liability coverage to fit your unique exposures.

Published in Blog