I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Cyber Insurance Sample Questions

The cyber insurance questionnaire(s) you fill-out may have some definitive questions that want Yes or No answer. Not all applications will have the same questions as each insurer and even many insurance brokers have their own questionnaires that they use as part of the application process.

EXAMPLES OF QUESTIONS ON A CYBER INSURANCE APPLICATION

By Todd Swartzman, RealTime CISO

Finance-Guru-Cyber-Insurance.png.jpeg

The questionnaire(s) you fill-out may have some definitive questions that want Yes or No answer. Not all applications will have the same questions as each insurer and even many insurance brokers have their own questionnaires that they use as part of the application process. 

You can ask the broker to help you better understand what these questions are really asking, and you can even add an addendum to better explain the answer to any questions that aren’t really a Yes or No given the question.  

That policy questionnaire is an excellent (free) way to measure how your business is positioned as far as your basic cybersecurity, your controls, policies, your compliance status, etc. If you find yourself answering “No” to many of the questions, this is your opportunity to improve your security to better protect your business, and maybe help you get better cyber insurance premiums. 

The questions being asked are proven steps businesses should already be taking to reduce their risks of a breach or ransomware event. 

Here I’ve listed some sample questions that insurers may use to help them qualify your business (aka, how risky are YOU to the insurer) for cyber coverage; having these things in place will  make it less likely you’ll need to use that shiny new cyber insurance policy: 

Email Security 

  1. Do you filter emails for malicious attachments or links? 

  2. Do you strictly enforce SPF on incoming emails? 

  3. Do you train your email users to recognize phishing and other email based threats? 

  4. Do you use Office 365 in your organization 

  5. If yes, do you enforce MultiFactor Authentication for all Office 365 accounts? 

Internal Security 

  1. Do you use Endpoint protection products across your enterprise? There may be choices or a listing of common products to help answer. 

  2. Do you use multi factor authentication? 

  3. For remote access? 

  4. Do you have a process to apply critical security patches rapidly? 

  5. Do you use web content filters to block potentially malicious content? 

  6. Do you use protective DNS services (Open DNS, Quad9, etc.?) 

  7. Do you provide your users with a password manager software? 

  8. Do you have a firewall with active security services such as Intrusion Prevention Services, malware scanning, or similar? 

Backup and Recovery Policies 

  1. Are your backups kept separate from your network (offline) or in a cloud service designed for this purpose? 

  2. Do you use a cloud syncing service (e.g. Dropbox, OneDrive, Sharepoint, Google Drive) for backups? 

  3. Have you tested the successful restoration and recovery of key server configurations and data from backup in the last 6 months? 

Other Ransomware Preventative Measures 

  1. Please describe any additional steps that your org takes to detect and prevent ransomware attacks. 

Once you purchase a policy, you still have some work to do in order to get the most out of the policy and further reduce your business risks. Every reputable underwriter has resources that their policy holders can use to shore up defenses, create policies, and help train staff. Use them, after all, you are paying for it. Many have resources like policy samples, virtual CISO services, Incident Response Planning guides, courses on HIPAA and PCI, awareness training content, just to name a few. 


Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Cyber Insurance - Application Tips

Your business is a target, whether you care to admit that fact or not.

Having a good cyber insurance policy is a safety net for your business in case of a breach, data loss event, business interruption due to a cyber event, assistance in a ransomware event, etc. Each policy is worded differently, and some policies won’t cover all things, or with the same limits.

Why does my business need cyber insurance?

By Todd Swartzman, RealTime CISO

RealTime IT_Cyber Insurance 1.jpg

Your business is a target, whether you care to admit that fact or not. 

Having a good cyber insurance policy that helps mitigate some of your business risks is a safety net for your business in case of a breach, data loss event, business interruption due to a cyber event, assistance in a ransomware event, etc. Each policy is worded differently, and some policies won’t cover all things, or with the same limits. 

[Contact your insurance broker to get the process started. If your agent doesn’t seem to be very conversant on this subject, a good agent will loop in a cyber expert from the underwriter.]

FILLING OUT THE CYBER INSURANCE APPLICATION

WHAT SHOULD MY MINDSET BE WHEN FILLING OUT THE APPLICATION?

Think liability. Your job isn’t to make your business look good to the broker or underwriter. Be 100% forthright with your answers and be sure to answer accurately.  Ask the broker or underwriter to define their terms. What we commonly understand a term to mean isn’t necessarily what the insurer says that these policy terms mean, so be sure to get clarification. One policy I was working on included a 28-page document explaining the terms of their one-page proposal. Remember, what you think a term means may be quite different than what the insurer says that term means for their policy – go with the insurers version.

WHAT IF I DON’T KNOW THE ANSWER TO SOME QUESTIONS?

If you don’t know the answers to some of the questions, just tell the broker; or if you’ve been asked to answer the questions on behalf of a client, let the client know you don’t know the answer. This is especially important if the question is a legal or compliance type question. Your goal is to answer accurately, and it is critically important that you do so.

Here is why:

cyber-insurance-infographic-final.jpg

Cottage Health Systems got sued by their insurance company for failure to follow “Minimum Required Practices”. This is an example of what can happen if you have to make a claim and you answered inaccurately during your application. Cottage Health said they were doing something preventative relevant to the event, but they actually were not. READ MORE HERE…

TYPES OF QUESTIONS

The questionnaire(s) you fill-out may have some definitive questions that want a Yes or No answer. Not all applications will have the same questions as each insurer and even many insurance brokers have their own questionnaires that they use as part of the application process. Ask the broker to help you better understand what these questions are really asking. You can include an addendum with your responses to better explain any answers where a Yes or No isn’t the best answer.

That policy questionnaire is an excellent way to measure how your business is positioned as far as your cybersecurity, your controls, policies, your compliance status, etc. If you find yourself answering “No” to many of the questions, this is your opportunity to improve your security to better protect your business, and maybe help get better cyber insurance premiums. 

The questions being asked are some basic, proven mitigations that businesses should already be taking to reduce their risks of a cyber event such as a breach or ransomware. Here is a list of some sample questions that not only will help you qualify for insurance; having these things in place will  make it less likely you’ll need to use that shiny new cyber insurance policy.


Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Dark Web Questions Answered!

Do you have questions about the Dark Web? We have an easy to read FAQ sheet for you to download in this brief blog post.

What is the Dark Web?

You’ve heard of the dark web…but what exactly is it? Here are some FAQs courtesy of DARKWEB ID.

The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines. Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web. The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

Free download

Download the free DARKWEB FAQ sheet now!

Download a free FAQ sheet that explains how to protect yourself, what it means if your organization’s credentials have been exposed and much more…


Information courtesy of DarkWeb ID.

Read More
I.T., Blog Deidre Frith I.T., Blog Deidre Frith

Free Digital Risk Protection activity Book

This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!

DIGITAL RISK PROTECTION ACTIVITY BOOK

This fun activity book teaches kids of all ages about Digital Risk Protection. In this book, three heroes work together to help people and businesses protect their information from being stolen by bad guys. Billy, Penny, and Danny work very hard to guard important Digital Data like passwords, files, banking documents, personal information, business secrets or anything else that is stored on a computer or in the cloud and keep it protected and safe!

DOWNLOAD NOW

 
 

This book is courtesy of www.idagent.com.


Read More
I.T. Deidre Frith I.T. Deidre Frith

COVID-19 Cyber Threat Exploitation Protection

This two-page guide will educate you about ways to help your business against COVID-19-related scams.
This COVID-19 Cyber Threat Exploitation guideline was created by the Cybersecurity and Infrastructure Security Agency (CISA) and United Kingdom’s National Cyber Security Centre (NCSC). Please feel free to share as needed.

Do you know what password spraying means? In the guide below, you can learn about ways to help your business against COVID-19-related scams. Here is a COVID-19 Cyber Threat Exploitation guideline created by the Cybersecurity and Infrastructure Security Agency (CISA) and United Kingdom’s National Cyber Security Centre (NCSC). Please feel free to share as needed. For more information on the CISA or NCSC, visit www.cisa.gov/coronavirus.

Joint_CISA_UK_Tip-COVID-19_Cyber_Threat_Exploitation_S508C_Page_1.jpg
Joint_CISA_UK_Tip-COVID-19_Cyber_Threat_Exploitation_S508C_Page_2.jpg
Read More