News and Articles


article image 11-3-21.jpgA Cyber Claims Roadmap

November 3, 2021

Download a PDF version of this article.

With cyber incidents on the rise and constantly evolving, it’s vital that a cyber policy is in place, and that the response process is clear in case of an incident. Certain steps that must be taken to help ensure coverage will be there when needed.

  1. Your company has suffered a security incident. You’re the victim of unauthorized access to your network. Or maybe you’ve had an attack perpetuated through malware, viruses, spyware, or the like. The clock is now ticking. A quick, effective response may help you avoid lawsuits and regulatory inquiries.
  2. Immediately gather your internal team and review your incident response plan. Quickly prep for reporting to your insurer. Important information to cover includes: What type of event was it? Is there a lost device? Malicious hacker? Disgruntled employee? What type of information was affected? Where are affected individuals located? How many people are involved?
  3. Your policy will have a cyber hotline typically monitored 24/7. Call it to get any necessary action started.
  4. Your claims specialist will help you formulate your response plan. It is critically important that you NOT go ahead and do these without contacting your insurer first. In most cases, the insurer and their vendors manage all aspects of the claims process.
  5. Your claims team will walk you through every step of responding to the incident and offer assistance and take actions on your behalf as necessary.

Your response plan may include:

  • Engaging pre-approved expert privacy attorneys to determine legal applicability of actions to respond to reporting requirements and maintain privilege
  • Engaging computer forensics to determine existence, cause and scope of the breach
  • Engaging a public relations or crisis communications firm
  • Conducting proper notifications, which might include customers, employees
  • Setting up a call center
  • Providing credit or identity monitoring

This roadmap is intended only as a guide. Details for accessing each insurer’s claims hotline service and instructions on how to notify a cyber claim are listed in each policy.

Important! Do NOT go ahead and hire your own vendors. First, contact your insurer and breach attorney. Vendors not only have to be insurer approved, but they must be engaged through the attorney to maintain attorney-client privilege.

The Bottom Line

Understanding your organization’s total cyber risk can be difficult, but the process can be greatly streamlined when assisted by a trusted insurance expert highly experienced in all the various forms of cybercrime and how to insure them. Preparation is key when it comes to cybercrime prevention and loss controls. Bringing an expert into the process as early as possible can help ensure coverage for critical risks, future potential claims management, and the latest developments in terms and conditions. ◼

news pic 10-1-23.jpg

Cost-Effective Cyber Risk Strategies

October 1, 2023 | While cybercrime has long been a risk for enterprises of all sizes, the threat of data breaches, ransomware attacks, and outright theft have increased… more ▶

news pic 9-15-23.jpg

About Integrated Risk Management

September 15, 2023 | Businesses face an ever-evolving set of risks. From employee issues to the adoption of new technologies, volatile market conditions, and threats… more ▶

news pic 8-31-23.jpg

Mitigating Risks in the Oil & Gas Industry

August 31, 2023 | The energy production industry has long been at the mercy of inherent risks arising from internal and external factors. Oil and gas producers must navigate… more ▶