US | EN United States | English
United States

Cyber Insurance

Let's work together to build a cyber liability insurance plan.

Cyber Hero Image

Hackers don't discriminate

You should never underestimate the potentially crippling effects of a cyber breach or assume that your company is too small, too big or too protected to become a target. If you do, you’re extending an open invitation to cyber criminals. 

A staggering number of small and medium-sized organizations suffer cyber attacks each year. And if your systems or data are compromised, it can put you out of business. At the very least, you could suffer a significant financial loss and take a severe hit to your reputation.

Contact a HUB broker to get started.


More detail

Cyber risk insurance keeps your business from closing its doors by protecting you from the expenses that occur after a data breach.  
This includes coverage for:
Network Security Liability — Covers your organization from lawsuits relating to the transmission of a virus from your system to a third party.
Privacy Liability — With privacy liability coverage, you’re protected against claims that result from the disclosure of confidential information collected, handled, or under your control.
Regulatory Defense and Penalties — You’re protected against legal costs associated with regulatory violations of privacy law caused by a security breach, as well as any penalties that might follow.
Electronic Media Content Liability — You’re protected against any personal injury or trademark/copyright claims that arise if the digital content that you created or distributed is found to have infringed on a third parties intellectual property.
Network Extortion — The growing trend of malicious code or “ransomware” is a real threat in today’s environment. But if it happens, you’re covered for payments you make to the hacker to regain control of your data or for those costs to restore from backup and remove the ransomware from the system. This also responds should an individual steal sensitive information and try to extort the company.
Network Business Interruption — You’re covered for loss of income and recovery expenses incurred as a result of an interruption or suspension of access to your computer systems. 
Breach Event Expenses — With breach event expenses coverage, you are covered for the costs of retaining a crisis management firm, outside counsel or forensic investigators to meet your compliance obligations.
Data Asset Protection — You’re covered for the costs associated with restoring, recreating or recollecting your data and other intangible assets as a result of a cyber crime.
Breach Response Planning — Avoid a costly business disruption by planning ahead for a major data loss.
Executive Training — Educate executives on their duty of care to implement appropriate cyber security measures and a recovery plan.  
Contact a HUB broker to get started.

  • Don’t Fall Victim to These 5 Cyber Myths

    You wouldn’t leave your office building unlocked overnight, so why take your organization’s cyber security any less seriously? It’s what stands between hackers and your sensitive data. Even so, some myths about the risks of falling prey to cyber thieves remain.

    Start the Slideshow
    Myth #1: “A small business like mine doesn’t need cyber insurance.”
  • Myth #1: “A small business like mine doesn’t need cyber insurance.”

    Fact: 85% of data breach insurance claims come from small to mid-sized businesses, and over 60% of those businesses never recover from a data breach. Regularly backing up your data is one way to minimize the damage that can occur if your business is compromised. If a computer is stolen or your network is infected with a virus, for example, the backups can enable your business to get back on its feet sooner.

    Myth #2: “Hackers aren’t interested in my business data.”
  • Myth #2: “Hackers aren’t interested in my business data.”

    Fact: Any data that can be monetized, such as credit card numbers, health records and contact information, is an attractive target. And if it’s easy to get, the more appealing it is to hackers: even email addresses can be used to lure employees or customers into disclosing personal information.Instructing your employees to not leave laptops unattended in coffee shops or airport lounges or use unencrypted smartphones to conduct business — and to secure their devices when not in use — can prevent cyber thieves from accessing your data.

    Myth #3: “Data breaches are already covered under my general liability insurance.”
  • Myth #3: “Data breaches are already covered under my general liability insurance.”

    Fact: Not true! And general liability insurers are saying so by amending their policies to state explicitly that losses due to cyber breaches are not covered. But even with cyber risk insurance, there are steps you can take to reduce the risk of a data breach in your organization. For example, employees should know and understand the dangers of using unencrypted connections via public Wi-Fi hotspots.

    Myth #4: “IT vendors have cyber security figured out.”
  • Myth #4: “IT vendors have cyber security figured out.”

    Fact: Two-thirds of data breaches are tied to third-party IT vendors. Cyber security and risk management should work in tandem. For greater peace of mind, be sure that you regularly receive audits and reviews from your data security providers. Those reports should include what they are doing to address their cyber security and governance in the event of a breach.

    Myth #5: “Cyber risk insurance is too expensive.”
  • Myth #5: “Cyber risk insurance is too expensive.”

    Fact: A cyber risk insurance policy can cost as little as $1,000 annually, whereas crisis response costs following a breach can easily climb well into six-figure amounts. There are also legal costs and settlements to consider.Few events can be more damaging to your business than a full-scale data breach. Having cyber risk insurance could prove to be priceless when it comes to protecting you and your business.

Key Ways to Minimize Business Disruption

If a cyber attack occurs, there are steps you can take to reduce the impact on your business.  

Train your employees to identify cyber threats

Educating your employees to identify threats is the first step to building solid cyber security. Explore our 10-step process for giving your employees the tools they need to become your first line of defense.