How to protect yourself from cybercrime

How to protect yourself from cybercrime

While you’re on your phone or laptop, would you like a crash course on cybercrime and how you can be protected? If the answer is no, then you probably already have cyber insurance cover on your business or home. If yes, read on...

What is cybercrime?
Basically, it is identity theft, online scams, cyberbullying and financial fraud, committed via computers or other digital devices.


Who does it relate to?
These numbers tell the story. Maybe you are less exposed if you live in a cave, off the grid in the middle of Australia with no phone and internet. But even then, you have some details recorded on the internet like your Tax File Number, and registered address for your cave…

sourced from Emergence

Even if you take out cyber insurance, what are your responsibilities?
Don’t re-use passwords or share passwords. Make sure to use multi-factor authorisation, like when you get a verification code as an SMS. Aside from that, generally, be vigilant, ensure you’ve installed good anti-virus software on your devices and don’t open links you’re unsure of. We can all do more, but this is a good start

Small business claim example

Compare Cyber Insurance Policies 5 Staff

Compare Cyber Insurance Policies $1M turnover

BACKGROUND

The Insured’s employee inadvertently misplaced a company laptop, which contained a list of 1000 client tax records and credit card details.

OUTCOME

A total cost of $250K was paid for the cost of notifying the affected individuals and the privacy commissioner of the data breach. This also included the costs incurred in retaining a Public relations firm to assist the insured in re-establishing their business reputation. 

Payment: $250,000

Cyber Crime

If you’re reading this article and you’ve never thought about protecting yourself, your family or your business against cyber offences,

Share This Post

More To Explore

News

Security risks in digital supply chain’s

Production and supply chains are constantly yo-yoing in the midst of Covid-19life. From a digital perspective, Cyber supply chains are complex series of interactions across the lifecycle of all products and services used by an organisation. Think every time your business interacts with a supplier, orders from a manufacturer, distributor or retailer there is an inherent risk.

Cybersecurity
News

Cyber Threat – What is the vulnerability log4j?

What is the vulnerability log4j? Log4j is used in many forms of enterprise and open-source software, including cloud platforms, web applications and email services, meaning that there’s a wide range of software that could be at risk from attempts to exploit the vulnerability.

CGU Cyber Defence

CGU Cyber Defence Product Review

CGU Cyber Defence Protects your business against cyber exposures that can impact your business from direct costs to your business, and claims from third parties. Costs associated with defending cyber claims are also covered. CGU’s incident response team is on alert and ready to take action 24/7.

Key features:

  • All subsidiaries covered including new and former subsidiaries
  • Advancement of defence costs
  • Breach Coach helps you understand what needs to be done
  • Worldwide territorial cover no matter where the attack originated from
  • Covers you for privacy breaches of data you capture and held by service providers (e.g. Cloud, ISP’s etc)
  • Free 1 Hour cyber consultation to assess risk mitigation strategies
  • 24/7 Incident response team
  • Public relations consultancy costs to protect the personal reputation of senior executives

CGU Cyber Defence at a glance

Privacy Breach

Privacy protection against third party claims for loss of;

  • Personal Information
  • Commercially Confidential Information
  • Employee Information
  • Information held by Service Providers (e.g. Cloud, ISP’s etc)
  • Defence costs covered

System Damage

Cover for lost, damaged or destroyed;

  • IT systems,
  • IT records / data
  • Includes retrieving, repairing, restoring or replacing data, systems or hardware
  • Also, includes external IT forensic or security consultants costs

Business interruption

  • Cover for loss of profits due to a Cyber Event
  • No indemnity period restriction
    • Subject to a time excess of 12 hours
  • COMPUTER VIRUS & HACKING
  • Cover for liability arising from hacker attack or virus
  • Covers loss or theft of your data or data for which you are responsible
  • Attacks by employees and third parties covered
  • Includes loss by phishing emails or Denial of Services attacks

 

Computer crime (OPTIONAL EXTENSION)

Cover for crime losses (sub limit applies) including;
– Loss of money
– Covers loss of money from Service Providers systems
– Loss caused by rogue employee or third party

Multimedia Liability

  • Protection against libel, slander or defamation
  • Cover includes infringement of copyright, trademarks & trade names
  • Covers your defence costs and third party’s costs
  • Covers all your marketing material (digital or print)

Breach Of E-Commerce Statutory Duties

  • Covers breach of statutory duty from eCommerce relating to security & management of data
  • Defence costs and compensation payable to third parties

Extortion

  • Covers payment of ransom
  • Costs of negotiating/mediating a security threat
  • Covers crisis management costs to resolve security threats

Brand protection

  • Public relations consultancy costs to protect the
    company brands.

Personal Protection

  • Public relations consultancy costs to protect the personal reputation of senior executives

Privacy Fines & Investigations

  • Cover includes fines and penalties incurred by you due to a privacy breach
  • Includes cover for your defence and investigation costs

Privacy Breach Notification & Loss Mitigation

  • Covers your breach costs including credit monitoring, identity theft monitoring, data restoration and forensic costs
  • Includes your legal costs
  • Access to call centre support services
  • Covers actual or suspected privacy breach

Reward Cover

  • Covers reward expenses to secure conviction of perpetrators of hacking attacks
  • Include payment of money or property for securing a conviction

Download a Brochure PRIcyber_defence_productoverview

Compare Cyber Insurance

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on the inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

 

 

Cyber Claim Scenario – Extortion

Cyber Claim Scenario – Extortion

(First Party)

EXAMPLE

A small accounting firm’s client records were locked by ransom software. The company was only able to get files released after paying a ransom of $50,000 to hackers.

RESULT

The firm contacted law enforcement and working with law enforcement, determined the payment should be made.

• $150,000 was paid for business interruption loss, the ransom demand ($50,000) plus consultants costs to advise on handling and negotiating the ransom, and the costs to restore the network as the hackers refused to release the files despite the ransom payment.

CGU SOLUTION

CGU Cyber Defence provides coverage for the payment of extortion monies and costs involved in negotiating, mediating and crisis managing to end the security threat.

 

Source CGU

Speak to one of Insure 247’s brokers on 1300 046 787

1300-Insure

Please note Cyberliabilitycomparison.com.au Insurance News is an information service sometimes provided by third parties Insure 247 Australia doesn’t warrants the accuracy of any information contained there in, readers should make their own enquiry’s before relying on information in the stories Terms of Service

Compare Australian Cyber Insurers

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs

What Is Cyber Crime

In basic terms, cyber crime is a blanket term for any type of activity of a criminal nature that is carried out using a computer and/or the internet.

Cyber crime includes all of the following:

  • Identity theft
  • Cyber stalking
  • Use of malware
  • Use of viruses
  • Computer and network hacking
  • Online scams
  • Phishing scams
  • Fraud
  • Information theft
  • Extortion
  • Identity theft

When you consider that almost all businesses have an internet presence or make use of the internet in their everyday business dealings, it becomes pretty clear that cyber crime presents a risk to even the smallest businesses. And criminals don’t necessarily need to hack your systems to commit cyber crime; if they manage to get their hands on a laptop, iPad or mobile phone belonging to your business (either because it has been stolen or left unattended), they have easy access to your information and are able to more easily commit their crimes.

What does cyber insurance cover?

Although policies will vary between insurers, a typical cyber insurance policy is designed to help you with both preventing breaches in the first place and dealing with them if and when they occur. Cyber insurance policies usually include the following:

  • The cost of restoring or recreating electronic data following a breach or leak
  • Forensic services to investigate a breach
  • PR coaching in the event a breach harms your business’s reputation
  • Assistance guarding against data breaches, hacking and employee error
  • Guidance on how to respond to a breach
  • Funds to cover the adverse financial effects related to a breach
  • Funds to cover any fines that might be payable following a breach

Source Knowrisk.com.au

Click here to Compare Cyber Insurance

[pardot-form id=”489″ title=”Cyber Insurance”]

Please note that any advice given has been provided without taking into account your objectives, financial situation or needs. It is also based on information we have obtained from you. You must ensure the information is accurate and complete. Otherwise, this advice may be based on inaccurate or incomplete information. You should consider whether the advice is appropriate in light of your objectives, financial situation and needs. Please read the Product Disclosure Statement and contact us if you require any clarification
QuotesOnline offering free business insurance quotes