US | EN United States | English
United States

Cyber Insurance

Let's work together to build a cyber liability insurance plan.

Cyber Hero Image

Hackers don't discriminate

You should never underestimate the potentially crippling effects of a cyber breach or assume that your company is too small, too big or too protected to become a target. If you do, you’re extending an open invitation to cyber criminals. 

A staggering number of small and medium-sized organizations suffer cyber attacks each year. And if your systems or data are compromised, it can put you out of business. At the very least, you could suffer a significant financial loss and take a severe hit to your reputation.

Contact a HUB broker to get started.

See what's covered in the policy. >




80%. Number of businesses that experienced a cyber attack in the last 12 months.  

How would you react in the heat of the moment? The wrong move can mean dire consequences.

Test your skills.

  • Don’t Fall Victim to These 5 Cyber Myths

    You wouldn’t leave your office building unlocked overnight, so why take your organization’s cyber security any less seriously? It’s what stands between hackers and your sensitive data. Even so, some myths about the risks of falling prey to cyber thieves remain.

    Start the Slideshow
    Myth #1: “A small business like mine doesn’t need cyber insurance.”
  • Myth #1: “A small business like mine doesn’t need cyber insurance.”

    Fact: 85% of data breach insurance claims come from small to mid-sized businesses, and over 60% of those businesses never recover from a data breach. Regularly backing up your data is one way to minimize the damage that can occur if your business is compromised. If a computer is stolen or your network is infected with a virus, for example, the backups can enable your business to get back on its feet sooner.

    Myth #2: “Hackers aren’t interested in my business data.”
  • Myth #2: “Hackers aren’t interested in my business data.”

    Fact: Any data that can be monetized, such as credit card numbers, health records and contact information, is an attractive target. And if it’s easy to get, the more appealing it is to hackers: even email addresses can be used to lure employees or customers into disclosing personal information.Instructing your employees to not leave laptops unattended in coffee shops or airport lounges or use unencrypted smartphones to conduct business — and to secure their devices when not in use — can prevent cyber thieves from accessing your data.

    Myth #3: “Data breaches are already covered under my general liability insurance.”
  • Myth #3: “Data breaches are already covered under my general liability insurance.”

    Fact: Not true! And general liability insurers are saying so by amending their policies to state explicitly that losses due to cyber breaches are not covered. But even with cyber risk insurance, there are steps you can take to reduce the risk of a data breach in your organization. For example, employees should know and understand the dangers of using unencrypted connections via public Wi-Fi hotspots.

    Myth #4: “IT vendors have cyber security figured out.”
  • Myth #4: “IT vendors have cyber security figured out.”

    Fact: Two-thirds of data breaches are tied to third-party IT vendors. Cyber security and risk management should work in tandem. For greater peace of mind, be sure that you regularly receive audits and reviews from your data security providers. Those reports should include what they are doing to address their cyber security and governance in the event of a breach.

    Myth #5: “Cyber risk insurance is too expensive.”
  • Myth #5: “Cyber risk insurance is too expensive.”

    Fact: A cyber risk insurance policy can cost as little as $1,000 annually, whereas crisis response costs following a breach can easily climb well into six-figure amounts. There are also legal costs and settlements to consider.Few events can be more damaging to your business than a full-scale data breach. Having cyber risk insurance could prove to be priceless when it comes to protecting you and your business.

Key Ways to Minimize Business Disruption

If a cyber attack occurs, there are steps you can take to reduce the impact on your business.  

Train your employees to identify cyber threats

Educating your employees to identify threats is the first step to building solid cyber security. Explore our 10-step process for giving your employees the tools they need to become your first line of defense.

Contact a HUB Broker
Thank you!
A HUB Broker will reach out to you shortly.
Contact HUB
Contact a HUB Broker