News and Articles


article image 11-3-21.jpgA Cyber Claims Roadmap

November 3, 2021

Download a PDF version of this article.

With cyber incidents on the rise and constantly evolving, it’s vital that a cyber policy is in place, and that the response process is clear in case of an incident. Certain steps that must be taken to help ensure coverage will be there when needed.

  1. Your company has suffered a security incident. You’re the victim of unauthorized access to your network. Or maybe you’ve had an attack perpetuated through malware, viruses, spyware, or the like. The clock is now ticking. A quick, effective response may help you avoid lawsuits and regulatory inquiries.
  2. Immediately gather your internal team and review your incident response plan. Quickly prep for reporting to your insurer. Important information to cover includes: What type of event was it? Is there a lost device? Malicious hacker? Disgruntled employee? What type of information was affected? Where are affected individuals located? How many people are involved?
  3. Your policy will have a cyber hotline typically monitored 24/7. Call it to get any necessary action started.
  4. Your claims specialist will help you formulate your response plan. It is critically important that you NOT go ahead and do these without contacting your insurer first. In most cases, the insurer and their vendors manage all aspects of the claims process.
  5. Your claims team will walk you through every step of responding to the incident and offer assistance and take actions on your behalf as necessary.

Your response plan may include:

  • Engaging pre-approved expert privacy attorneys to determine legal applicability of actions to respond to reporting requirements and maintain privilege
  • Engaging computer forensics to determine existence, cause and scope of the breach
  • Engaging a public relations or crisis communications firm
  • Conducting proper notifications, which might include customers, employees
  • Setting up a call center
  • Providing credit or identity monitoring

This roadmap is intended only as a guide. Details for accessing each insurer’s claims hotline service and instructions on how to notify a cyber claim are listed in each policy.

Important! Do NOT go ahead and hire your own vendors. First, contact your insurer and breach attorney. Vendors not only have to be insurer approved, but they must be engaged through the attorney to maintain attorney-client privilege.

The Bottom Line

Understanding your organization’s total cyber risk can be difficult, but the process can be greatly streamlined when assisted by a trusted insurance expert highly experienced in all the various forms of cybercrime and how to insure them. Preparation is key when it comes to cybercrime prevention and loss controls. Bringing an expert into the process as early as possible can help ensure coverage for critical risks, future potential claims management, and the latest developments in terms and conditions. ◼

news pic 5-15-23.jpg

Workers’ Compensation Considerations

May 15, 2023 | In today’s dynamic business landscape, the welfare of employees remains a paramount concern for organizations. Workers’ compensation plays a critical role… more ▶

news pic 5-2-23.jpg

5 Risks Banking Institutions Face in 2023

May 2, 2023 | The banking industry has survived significant difficulties over the past few years, navigating a troubled global economy, volatile political climate, and… more ▶

news pic 4-17-23.jpg

Significant Health Trends for 2023

April 17, 2023 | Health has been at the heart of the world's list of most pressing crises in the last few years. A worldwide pandemic, growing mental health concerns, and… more ▶