February 6, 2017 By David Strom 2 min read

It may be time to buy cyber insurance for your business. There are a lot of choices and ways to go about doing this, and all firms start out at the same place — offering reimbursement in case you suffer a data or financial loss. But they end up in different places: Some vendors have insurance policy add-ons to your traditional business liability insurance, while others bundle in protection as part of a computer or smartphone security application.

Let’s take a closer look at your options and why you might want to go with multiple approaches.

Choosing the Right Cyber Insurance Policy

Given that everyone is a target these days, even a small breach can be costly in terms of notifying customers, handling the public relations fallout, paying legal fees and covering other non-IT costs. That is why is makes sense to consider a policy specifically designed for this situation.

With Armor’s Cyber Warranty, for instance, you’ll receive a $100,000 warranty backed by an insurance company in the event of a breach. With this policy, the managed security company shows that it is willing to stand behind its products and cloud-based protection. Of course, you need to deploy Armor’s solutions to be eligible for this coverage, which could be a major turn-off for an organization that works with multiple vendors to protect its data.

Other insurance companies that offer policies include LifeLock Business Solutions and The Hartford. Select coverage from these companies can put you in touch with incident responders, lawyers, privacy program managers and security analysts. Customers also have the option to add breach insurance to a standard general business policy. They can also purchase one or both policies to handle network security liability and first response activities, which may supplement business insurance from another carrier.

Smartphone and Tablet Protection

Another approach companies are taking is to utilize a more typical IT product. We are seeing innovation, for example, with mobile protection.

One such option, Lookout, has apps for both iOS and Android devices. These offer identity theft protection, help in restoring your data and a built-in $1 million dollar insurance policy should your identity be compromised or your phone rooted. The app also sets off a very loud siren to help you locate your device in the event it’s lost, and it backs up your contacts and photos. The company offers three plans ranging from free to $10 a month.

Of course, cyber insurance doesn’t diminish the importance of protecting your endpoints from cyberthreats, but it certainly can help you cover all your bases.

More from Data Protection

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today