Skip to main content

Are you Protected Online? Why is Cybersecurity Insurance Important?

Video Library - Woman Listening to a Video Through Headphones on the Way to Work in the City

If you shop, store files or photos, or even pay bills online your personal information is out for anyone to find. That is really unnerving to think about right? Have you ever had your personal identity stolen? I have and the process to chase down all the places that your name and credit are effected. 

It seems like my bank is sending me a new credit card because there was some sort of malicious activity that flagged my account. Or I am getting notifications from online protection services that my information has appeared on the dark web. 

What do Cyber Attacks Look Like?

According to FEMA, a Cyberattack are malicious attempts to access or damage mobile phones, gaming systems, personal computers and more. Thieves can access devices and steal personal identities, access your device or computer files, target children or the elderly, and cause issues with business services, transportation and travel.

 Phishing: 90% of all cyber attacks begin with phishing. Find out how attackers leverage phishing attacks to gain access to protected systems, hosts, and networks. Discover how technology can be used to mitigate phishing attacks and train users to better recognize phishing emails. (Source CISA.gov)

How can You Prevent a Cyberattack and Protect Yourself?

  • Keep Your Software and Operating Systems Up-to-Date.
  • Use Strong Passwords and two-factor authentication.
  • Do not open or click on emails or personal messages from an unknown sender. Phishing is when you click on or reply to an email, text or social media message link from someone you do not know.
  • Secure your home Wi-Fi and be careful when accessing public Wi-Fi.
  • Verify that the website you are using has a URL that starts with HTTPS.
  • Activate antivirus, Ransomeware, malware and firewalls on your personal devices and keep them updated.
  • Keep watch on your accounts for unexplained charges. Do a monthly check of your credit report to verify there have not been any accounts opened that you are unaware of.

What to Do if You Suspect You are the Victim of a Cyberattack?

  • Change all passwords immediately.
  • Do a security scan your device. If you are unsure how to do this, turn off the device until you can get assistance doing so.
  • Contact any financial institutions that you use to inform them that you suspected fraudulent activity.

What to Do After You have Been Attacked?

  • You can file a report with the Office of the Inspector General is you suspect that someone is using your social security number.
  • Contact the Social Security Administration.
  • File a report with local policy or the FBI. Click Here for information on how to prepare for an FBI investigation.
  • Contact your local police for more information and to file a report.

What is Cyber Insurance*?

Cyber Insurance —  also known as cyber liability insurance — covers the costs of claims associated with stolen customer data, cyberattacks, breaches, and fraud. There can be thousands of dollars in fees, fines and outstanding balances, Cyber Insurance (depending on the policy) helps to recover cost associated with an attack.

There are more than 4,00 cyberattacks everyday in the United States since 2016 according to the FBI (Source: Forbes Advisor). 

Personal cyber insurance, also called “cyberattack insurance,” is often sold as an add-on to homeowners insurance and can cover a range of cyber crimes:

  • Cyber attack coverage pays for the removal of a virus or reprogramming of desktops, laptops, smartphones, tablets, Wi-Fi routers and other internet access points, such as smart home devices and security systems.
  • Cyberbullying coverage helps you deal with online harassment that results in wrongful termination, discipline from school, temporary relocation expenses, temporary private tutoring, lost wages and legal expenses.
  • Cyber extortion coverage helps you recover from ransomware attacks that block you from accessing your personal data and demanding a fee to regain control. This coverage might include assistance from experts who can help you regain your files and reimbursement for any ransom paid, if approved by your insurance company.
  • Data breach coverage helps pay for services if personal data entrusted to you is lost, stolen or published. For example, if you sell tickets for a school fundraiser and have credit card information from buyers on your tablet and the tablet is stolen, this coverage would pay for services to the individuals who were affected by the data breach.
  • Online fraud coverage pays for direct financial losses due to problems like identity theft, unauthorized banking or credit card transfers, phishing schemes and other types of fraud.

In addition to the above types of coverage, personal cyber insurance might include services such as:

  • Access to fraud specialists who can assist you throughout the recovery and resolution process
  • Active cyber monitoring to help prevent or minimize a cyber loss
  • Lawsuit protection for allegations of unintentional online libel, slander or invasion of privacy
  • Replacing or repairing electronic data
  • Retrieving, replacing or recreating financial or personal identification documents

Ask Your Insurance Company About Cyber Coverage

Your Insurance Agent will be happy to answer any questions about adding cyber insurance to your home policy.

You may be able also to add fraud coverage to supplement what’s not covered by your homeowners policy. While homeowners insurance typically already covers credit and debit card fraud, check forgery and counterfeit cash, fraud coverage can help cover financial losses from fraud such as identity theft. It can also help cover intentional and criminal deception, which is when you have a financial loss after you’re misled.

For More Information please contact Austin Taylor Insurance.

Sources Include

*Forbes Advisor

Cybersecurity and Infrastructure Security Agency

Simply Business

Stop Ransomware

FBI Information