Cyber Liability Insurance

What is Cyber Insurance?

Cyber Insurance is designed to cover consumers of technology services or products from the financial experience in the event of a breach of sensitive data (Personal Identifiable Information, Protected health information, or personal financial information). Cyber liability coverage includes legal costs, forensics and security consulting, identity theft protection services, data restoration services, and any settlement with victims.

Insurance Requirements

Before businesses can transfer this risk to the Insurance company, they are required to have certain controls to protect and limit their exposure. The level of controls the company has implemented is ascertained in a Cyber Liability Questionnaire which must be filled out by the organization. Questions may include the following:

  • Do you have a process in place to regularly download and install patches?
  • Do you have an incident response plan to respond to a network intrusion?
  • Is Multi-factor authentication for remote access to email and other systems and programs containing private or sensitive data in bulk implemented?

To further limit risks insurers may not cover any acts sponsored by nation-states or in conjunction with a traditional physical war. Two recent incidents believed to be caused by nation-states are the Wanna-Cry incident and the Solar Winds cyberattack. Wanna-Cry affected companies throughout the world in May of 2017 for 4 days and is estimated to have caused losses in the billions, while the Solar Winds cyberattack is estimated to have cost around 90 million which under these new requirements would not have been covered.

Consult with Our Experts

What This Means for You

We encourage organizations to put in place controls to protect critical data and systems and align them to organizational accepted risk. Obtain Cybersecurity Insurance to transfer these remaining risks and limit the organizational impact. Insurance is not an alternative to implementing good compliance measures, but for many organizations is the motivating factor for implementing these measures.

Contact Morefield to speak with our team of cybersecurity experts or contact us with any help your organization is facing navigating these fragile waters.

Fill out our contact form or call (717) 761-6170 for a consultation.

Insurance Requirements

CONTROLS

The Cyber Insurance Underwriters put together a list of controls that are aligned with traffic light colors. Red is the minimum standard required by organizations to implement, Amber being requirements above the minimum and are more attractive to underwriters, while green requirements are the most attractive to underwriters.

Red requirements:

  • Multifactor authentication (MFA) for:
    • Employee email.
    • Remote access for users to access sensitive data.
    • Privileged accounts / privileged access. These include domain administrators, Chief Financial Officer, Human Resources, and any other individual that access sensitive data.
  • Offsite (Preferably offline) backups of critical data.
  • Endpoint detection and response (EDR) solution on all managed endpoints.
  • Create an audited written plan for patching critical software and hardware.
  • Employee cybersecurity training, including phishing simulations.

Amber requirements:

  • Strong email filtering tools to limit risky emails being delivered.
  • Privileged access account security measures.
  • End-of-life unsupported software and hardware segregated from the network with plans to decommission.
  • Cyber-incident disaster recovery/incident response plan, and segmentation of your computer network by operation function, data classification, and operational risk.
  • Local admin accounts are disabled on endpoints.

Green requirements:

  • Organizational Password management application implemented.
  • Detailed asset footprint of service accounts with domain credentials, services, and monitoring of these accounts.
  • Security information and event monitoring implemented (SIEM).
  • Data loss prevention tools implemented.
  • Follow an information security framework such as NIST Cyber Security Framework, CIS, or other common cybersecurity frameworks.
  • Maintain a 24/7 Security Operations Center (SOC) – internal or external.

Consult with Our Experts

Testimonials

Hear From Our Customers

“Thanks Morefield! Your technician completed all of our computers so quickly and efficiently that there was no interruption to our clinic schedule. Much appreciated!”

Tina S., Healthcare Office Director
Health Care, Cloud and Managed Services, IT Customer, Security

“Our technician made it good. His friendly and communicative interaction was a pleasure to experience. His manner and knowledge allowed me to feel confident that I was being taken care of properly. Thanks Morefield!”

Jason D., Vice President
Small/Medium Business, IT Customer

“Helpful, friendly, pleasant technician. Prompt service. Thank you Morefield Communications!”

Joe A., Director of Operations
Worship Centers, IT Customer

“Morefield got to the bottom of our A/V issues quickly and their communication was efficient.”

Tammy S., Education Director
Education, A/V Customer

“Our technician is always helpful and professional. He helps us resolve our issues and find new ways to support our telephone needs. Thank you!!”

Rob C., CIO
Enterprise, Security, Unified Communications
view All testimonials

Sign Up for Our Newsletter