A Complete Cybersecurity Checklist for Obtaining Cyber Liability Insurance

Imagineering Logo
A Complete Cybersecurity Checklist for Obtaining Cyber Liability Insurance

When it comes to cybersecurity, our collective frame of reference usually involves the businesses in the news whose data is being held for ransom. The common response is to think, “It will never happen to me.” The unfortunate reality is that businesses need to be protected from ransomware and cyber attacks, just as your house needs to be protected from flood or fire.

Cyber liability insurance can protect your business against the expenses associated with a data breach — and covers some risks you might not have even thought of. But in order to obtain cyber liability coverage, insurance companies will require your business to be set up with certain cybersecurity measures first. These security measures are put into place because the insurance companies know how effective they are at preventing, detecting, and/or responding to cyber attacks.

Ransomware Coverage Checklist

Ransomware is defined as a type of cyberattack that blocks access to a victim’s data, website, client services systems, or other critical resources until payment is made in return. Ransomware Coverage can include the money to pay ransom demands, the cost of hiring experts to negotiate with the hackers, and the cost of computer forensics experts who can determine how the hackers gained access.

[See also: The Hidden Costs of Ransomware: 4 Ways It Can Cost Your Business]

In order to obtain Ransomware Coverage, most insurance companies will evaluate your business to ensure you have the following cybersecurity measures in place:

  1. Multi-Factor Authentication (MFA) for remote access
  2. Anti-malware software
  3. Patch management process 
  4. Mandatory information security and privacy training of employees and contractors (for social engineering and phishing campaigns) at least once a year
  5. Weekly backups of critical information
    1. Subject to MFA, segmentation, and encryption
  6. Recovery time under 8 hours (objective for critical systems, applications, and processes)
  7. Business continuity plan (detailing how the business will continue operating during an unplanned disruption in service)
  8. Disaster recovery plan (detailing how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks, and any other disruptive events)
  9. Incident response plan (detailing how to return affected systems and data back to an operational state as quickly as possible)
 

[See also: 4 Tips for Planning a Backup & Recovery Strategy]

Technology Fraud Coverage Checklist

Another common type of Cyber Liability Insurance covers technology fraud. Technology fraud coverage responds to a situation in which an unauthorized party gains access to a business’s computer system and enters or alters data. The coverage will then typically pay for direct financial loss.

In order to obtain Technology Fraud Coverage, most insurance companies will evaluate your business to ensure you have the following cybersecurity measures in place:

  1. Technology fraud/social engineering or security training (e.g. social engineering, phishing, spear phishing, baiting, etc.)
  2. Procedures to verify the authenticity of any payment or funds transfer
  3. Strong passwords required with a mix of uppercase, lowercase, numbers, and symbols
  4. SPAM mail filters
  5. Regular or automated software patching schedule
  6. Procedures and tools to backup and restore sensitive data and critical systems
  7. Multi-Factor Authentication (MFA) on email access
  8. Secure Email Gateway (e.g. Proofpoint, Barracuda, Mimecast)
 

Although this may seem like a long list of requirements, it is worth it to secure the future of your business. Think about the financial loss, recovery costs, lost productivity, business interruption, reputational harm, and legal repercussions if your business encounters a cyber attack.

Cybercrime is run by highly organized groups. Thinking “it won’t happen to me” has changed to “it’s only a matter of time.” These attackers know how to identify vulnerabilities and take advantage of the lack of cybersecurity measures put into place.

Engaging local professionals, like Imagineering IT, can help put these checklist items into action, secure your business, and help you plan strategically for the long term.

Contact us for a Free Consult »

Protect Your Business for the Price of a Cup of Coffee

HOOPS Business Management Software, Powered by Acumatica

Request a FREE Demonstration

Experience the Power of the Cloud with a free demonstration of HOOPS Business Management Software, powered by Acumatica.

FREE Consultation

Request a free consult to discuss your business and technology goals by filling out the form below.

Thank You

We have received your submission.

If you have additional questions, please call (715) 834 – 7712.