News and Articles
A Cyber Claims Roadmap
November 3, 2021
▶ Download a PDF version of this article.
With cyber incidents on the rise and constantly evolving, it’s vital that a cyber policy is in place, and that the response process is clear in case of an incident. Certain steps that must be taken to help ensure coverage will be there when needed.
- Your company has suffered a security incident. You’re the victim of unauthorized access to your network. Or maybe you’ve had an attack perpetuated through malware, viruses, spyware, or the like. The clock is now ticking. A quick, effective response may help you avoid lawsuits and regulatory inquiries.
- Immediately gather your internal team and review your incident response plan. Quickly prep for reporting to your insurer. Important information to cover includes: What type of event was it? Is there a lost device? Malicious hacker? Disgruntled employee? What type of information was affected? Where are affected individuals located? How many people are involved?
- Your policy will have a cyber hotline typically monitored 24/7. Call it to get any necessary action started.
- Your claims specialist will help you formulate your response plan. It is critically important that you NOT go ahead and do these without contacting your insurer first. In most cases, the insurer and their vendors manage all aspects of the claims process.
- Your claims team will walk you through every step of responding to the incident and offer assistance and take actions on your behalf as necessary.
Your response plan may include:
- Engaging pre-approved expert privacy attorneys to determine legal applicability of actions to respond to reporting requirements and maintain privilege
- Engaging computer forensics to determine existence, cause and scope of the breach
- Engaging a public relations or crisis communications firm
- Conducting proper notifications, which might include customers, employees
- Setting up a call center
- Providing credit or identity monitoring
This roadmap is intended only as a guide. Details for accessing each insurer’s claims hotline service and instructions on how to notify a cyber claim are listed in each policy.
Important! Do NOT go ahead and hire your own vendors. First, contact your insurer and breach attorney. Vendors not only have to be insurer approved, but they must be engaged through the attorney to maintain attorney-client privilege.
The Bottom Line
Understanding your organization’s total cyber risk can be difficult, but the process can be greatly streamlined when assisted by a trusted insurance expert highly experienced in all the various forms of cybercrime and how to insure them. Preparation is key when it comes to cybercrime prevention and loss controls. Bringing an expert into the process as early as possible can help ensure coverage for critical risks, future potential claims management, and the latest developments in terms and conditions. ◼
Most Popular Articles
The Most Common Occupational Hazards on Film Productions
Breaking Down the Difference Between Occupational Accident Insurance and Workers’ Compensation
What is Force-Placed Insurance and What Does It Cover?
How Public Liability Insurance Differs from General Liability Insurance
The Laws and Restrictions That Every Music Venue Must Follow
Cost-Effective Cyber Risk Strategies
October 1, 2023 | While cybercrime has long been a risk for enterprises of all sizes, the threat of data breaches, ransomware attacks, and outright theft have increased… more ▶
About Integrated Risk Management
September 15, 2023 | Businesses face an ever-evolving set of risks. From employee issues to the adoption of new technologies, volatile market conditions, and threats… more ▶
Mitigating Risks in the Oil & Gas Industry
August 31, 2023 | The energy production industry has long been at the mercy of inherent risks arising from internal and external factors. Oil and gas producers must navigate… more ▶