Common Cyber Insurance Objections

With the rise of cyber attacks, Cyber Insurance is become more and more of a necessity in a business’ risk management strategy. Here are some of the common objections we hear when talking to clients about this invaluable coverage and our responses.

OBJECTION

“I am not a target for hackers.”

RESPONSE

– Many data breaches occur because of human error; a computer is stolen, left in a cab, or a user does not utilize proper security protocols.
– A study by National Cyber Security Alliance found that one in five small businesses fall victim to cyber crime each year and roughly 60 percent of those businesses go out of business within six months.
– A study by PwC US found that security incidents have increased 66 percent year over year since 2009 with an average of 117,339 cyberattacks and security incidents occuring per day.
– A study by Trustwave found that 98 percent of all computer applications are at risk of being hacked.                                                     ____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“We do not sell goods or services online”

RESPONSE

If you capture and/or store customer and vendor data, you have cyber risk. Cyber policies are designed to address the risk of utilizing technology, computers and internet connectivity while conducting daily business including capturing, storing and using data every day.

____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“We use vendors for all our IT services.”

RESPONSE

Based on data regulations, the company that collects data and records from clients is held responsible if a data breach occurs. Legal liability cannot be transferred by contract, therefore, if a point of sale device (i.e. cash register) is comprised, the obligation to notify impacted parties will fall on the business owner, not the vendor who processes or stores payment information.

Indemnification agreements typically limit recourse to the value of the contract. An average data breach involving personal financial records could cost a firm hundreds of thousands of dollars, well in excess of the value of most vendor contracts.

____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“We have top notch security in place.”

RESPONSE

There is no such thing as “perfect security.” Agencies including the Central Intelligence Agency, White House and National Security Agency have been compromised by inside and outside parties, proving that no security solution is impenetrable. Cyber insurance augments even top-notch security solutions.

____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“Our general liability policy will cover the loss.”

RESPONSE                   

General liability (GL) policies lack the flexibility to address new and emerging cyber perils. Several significant court decisions have ruled that a GL policy does not cover data privacy breach losses and the Insurance Services Organization released a data loss liability exclusion GL for policies in 2014. ____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“I don’t collect a lot of data.”

RESPONSE

Every business with employees and/or vendors collects and stores private information including addresses, health information, marital status, bank account information, payment history, human resources records, etc. Additionally, if you sell goods/services, every financial transaction carries protected information including credit card and bank transfer information.

The mishandling of such information can lead to a liability or public relations challenge.

____________________________________________________________________________________________________________________________________________________________________________________

OBJECTION

“I don’t see the value of cyber insurance.”

RESPONSE
Cyber insurance is more than a product to protect you from a data breach, Schinnerer Cyber Protection Package covers website media, cyber extortion, digital property replacement, cyber crime, business interruption, privacy liability and network security liability.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s