US Pro CLUE Blog

US Pro CLUE Blog

Cyber Liability Underwriting Exposures (CLUE) is a leading industry news source and information medium specifically developed by US Pro for its agency partners.

CLUE gets its information from many resources, including industry experts, underwriters, insurance publications, and multiple web-based articles to keep our customers current in the areas surrounding Cyber Liability Insurance programs.

 

National Cyber Security Awareness Month: Week 2

Posted by on Oct 18, 2017 in Cyber Source | Comments Off on National Cyber Security Awareness Month: Week 2

Week 2: October 9-13 Theme: Cybersecurity in the Workplace is Everyone’s Business

Creating a culture of cybersecurity is critical for all organizations-  large and small businesses, schools, nonprofits, and government agencies – and must be a shared responsibility among all employees.  One of the most alarming statistics in Cyber insurance is that 80% of all events are caused by one’s own employees.  Week 2 will showcase how organizations can protect against the most common cyber threats.

Small businesses, schools, nonprofits, and government agencies are most at risk with the expected lack of resources, either physically or financially, to combat the risk like large corporations can.  Since there are multiple threats they face, they must focus their efforts towards mitigating the top threats likely to cause them the most harm.

These threats are as follows:

  • Ransomware events
  • Cyber Crime losses
  • Business interruption expenses

Here are some basic tips designed to help your clients reduce their risk to the occurrence of these events, and are only a few of several actions which can be implemented.

 

RANSOMWARE EVENTS

Since most Ransomware events occur due to unintentional employee negligence, some good advice for IT personnel to consider is following these tips:

  • Keep clear inventories of all of your digital assets and their locations, so cyber criminals do not attack a system you are unaware of.
  • Keep all software up to date, including operating systems and applications.
  • Back up all information every day, including information on employee devices, so you can restore encrypted data if attacked.
  • Back up all information to a secure, offsite location.
  • Segment your network: Don’t place all data on one file share accessed by everyone in the company.

 

CYBER CRIME EVENTS

How do you try to avoid becoming a victim of a phishing attack?

There is a lot of valuable information on this topic, and implementing procedures and processes that can do a great job of mitigating the exposure points costs no money.  However, implementation is only successful if practiced properly.

Here are a few simple things to always remember:

  • Avoid clicking on links unless they were specifically requested. If you want to click a link you received, open up a new email and write the person back in a new message and ask if they sent the link.
  • Set a limit on the amount of money that can be electronically transferred.
  • Never open up any kind of attachment from sources you do not know.
  • Any message that requests for you to disclose any piece of personal information is suspicious. Never give out any personal information in response to a request for such.

 

BUSINESS INTERRUPTION EVENTS

Most businesses do not compute the cost of business interruption into other events that occur to their organizations.  They often do not correlate the down time expense with the event causing the down time. There are three costs associated with the non-physical business interruption event, regardless of the cause of the interruption:

  • Income loss– These are the dollars you lose because the website does not work, the widgets are not being made, the service is not being performed, etc.
  • Interruption expenses– These are the static costs of operating business that still must be paid during an interruption, such as employee costs, lights, rent, and so forth.
  • Extra expenses– These are the costs you incur to set up new systems to operate during the interruption, or costs to hire extra employees to enter data, etc.

The best defense against experiencing prolonged BI expenses is to have a disaster recovery plan in place, which is continuously reviewed and updated.  Elements of the disaster recovery plan should include at least these areas of focus:

Backups– The best defense against data recovery trouble is to have proper backup procedures in place.  Two important notes regarding data backups:

  • Protect your cloud Office 365 – This suite deserves unique mention because it is so widely adopted, with an estimated 50,000 small businesses added each month. Microsoft does permanent removal of deleted files after 14 days, generally before someone realizes that they deleted something they need again, and recovery within that 14-day window can take days. This means that O365 users need to setup their own backup system. The best tools offer self-service recovery capabilities for quick restores.
  • Ransomware resistant – Ransomware developers target Windows servers because of their large numbers. This is especially true among SMBs companies, as they specifically target those least likely to have good defenses. To keep from being a victim, backup appliances should be Linux-based, and ransomware resistant.

Disaster Recovery Processes- Disaster Recovery-as-a-Service, (DRaaS) is the ability to recover application and business performance on remote infrastructure after cyber-attacks, accidents, or natural disasters. This capability includes not just data storage but system settings pre-positioned to be deployed in the event of a disaster declaration. This capability can occur in remote corporate locations or in a public cloud.

Implement these DR Best Practices:

  • Automatic -Implementing disaster recovery should not depend on someone manually starting recovery, especially if they are from potentially failed servers. After you lose your servers, your DRaaS provider should be able to spin up your remote infrastructure in minutes.
  • Service Level Agreements (SLA) – It is important to have an SLA with your DR supplier. Not only does this give leverage to demand quick action, it is also a sign that the supplier is confident to offer compensation if they do not meet their standards.
  • Testing– While we all hope that we will never need our disaster recovery tools, hope is not a strategy. IT needs to ensure that if a disaster is declared, systems will work as planned. In fact, many federal and industry regulations such as HIPAA and SOX mandate regular testing to ensure compliance. Written proof of test results is common. However; superior testing should actually simulate the DR process up to, but just before applications are deployed.

A lot more information on these subject is available and credited to the article found at this link:  https://www.drj.com/articles/online-exclusive/the-evolving-challenge-of-cybersecurity.html

Look for more useful information in next week’s review of Week 3 of Cyber Security Awareness Month.

National Cyber Security Awareness Month: Week 1

Posted by on Oct 9, 2017 in Cyber Source | Comments Off on National Cyber Security Awareness Month: Week 1

Cyber Security Awareness Month:  Week 1 is Simple Steps to Online Safety- What Can You Do?

Per the DHS, all members of the public can take some simple actions to protect themselves online and to recover in the event a cyber incident occurs.  In Week 1 will address the top consumer cybersecurity concerns, provide simple steps to protect against these concerns, and help the public understand what to do if they fall victim to cyber crime.

Today US Pro recommends some basic behaviors that can go a long way towards mitigating these online cyber security threats:

Encrypt your data:  Encryption is a safe harbor in almost every privacy regulation.  Using either Symmetric or Asymmetric encryption offers you a maximum layer of security against data theft.

Continuing education:  Employees are the largest threat to a commercial business.  As much as 80% of events are caused by unintentional employee negligence.  Continuous education and training of your employees on current threats should be implemented.

Some topics that should be included in this training are:

  1. Avoiding improper disposal by limiting the task to a position duty rather than allowing everyone to dispose unsupervised.
  2. Double check before hitting send to confirm that the information being sent is being sent to the right person and contains the right information.
  3. Avoid the clicking of links embedded in emails, even when the emails are from sources you trust.
  4. Learn to identify phishing scams.

Become Phishermen:  Social engineering is the tactic used by an individual to deceive or trick another individual into disclosing personal information they would not otherwise disclose.  The most common form is to mimic your bank and ask for you to click on a link and log into your account as a security test.  These are known as phishing scams.

Phishing is the leading cause of unauthorized access to or use of computer systems, and has evolved into a more sophistical technique known as Spear Phishing.  To minimize the threat of an event arising from a Phishing act, the very best policy is to become phishing experts, or Phishermen.  Consider these tips in addition to many others we advocate:

  • If you must click on embedded links, then verify embedded link integrity.  Hover your mouse over the link and the actual URL should be displayed.   If it differs from what is written on the link, it is suspicious.
  • Beware of child domains.  A child domain is when a URL is created using what appears to be a valid domain followed by the bad domain.   Most users will never notice it.
  • Failed the English test.  Any message filled with grammar, punctuation or spelling mistakes is likely suspicious.  Most companies sending out corporate emails proofread and spellcheck first.

There are many other different mechanisms that can be engrained into the daily corporate lives of employees that will serve to mitigate the risks against commercial business.  These 3 tips are a good “Simple Start” towards having better online behavior patterns and getting on the road to improving your Cyber risk health assessment.

Look for our article during the theme for Week 2: Cyber Security in the Workplace is Everybody’s Business.  We will give an in depth explanation of what a non-physical fire is and why they are so much more destructive to a business than the standard property fire.

 

Cyber Insurance Evolution

Posted by on Sep 21, 2017 in Cyber Source | Comments Off on Cyber Insurance Evolution

Contingent BI Coverage and more…

2017 is a fascinating year so far for Cyber Insurance. As fast as new carrier programs enter the Cyber marketplace, Cyber exposures evolve putting them behind the curve. Cyber Liability exposures manifest themselves in new ways every day, and as America’s Cyber Insurance Experts, US Pro is at the forefront of its evolution.

Today we want to bring you up to speed on the newest Cyber threats, and how these are being addressed by one of our leading carriers.

The Internet of Things (IoT)

The IoT can be summarily defined as any device that is connected to and transmits data through the internet. This connectivity without security presents a variety of vulnerability gaps that may result in a security breach. Such a breach may allow users to gain access to important and even vital network resources, giving them control over the victim. This can be especially problematic for the healthcare industry, manufacturing sector, and many others who rely on network-based systems for their daily operations.

Many of today’s Cyber policies exclude Bodily Injury claims. Extending this coverage for such claims when they arise directly from a security breach or privacy compromise is important in this evolving frontier. This Contingent BI Coverage is important and exciting and the next chapter unfolding in the book of Cyber Insurance.

Look for even more exciting new coverages from US Pro as we are committed to remaining at the forefront of this coverage and America’s Cyber Insurance Experts!!

Cyber Extortion vs. Cyber Crime

Posted by on Feb 9, 2017 in Cyber Source | Comments Off on Cyber Extortion vs. Cyber Crime

What’s the Difference

Cyber Extortion and Cyber Crime (what many call social engineering). These were two of the fastest growing threats to commercial entities, nonprofits and municipalities in 2016 and are expected to surge in 2017. Cyber Insurance programs respond differently to these types of events, and the language in the policies for this coverage is very different from carrier to carrier.

​When dealing with coverage for both Cyber Extortion and Cyber Crime threats, be sure to first understand what event(s) trigger the coverage into response. Complement this knowledge with an understanding of the differences between these two types of crimes and what the potential financial impact may be.

Cyber Extortion

A Cyber Extortion event occurs when an intruder has gained unauthorized access to or use of one’s systems and infecting it with what is commonly known as Ransomware. Ransomware comes in varying forms, but with two main types: Computer Locker and Data Locker. Each presents a unique challenge, with Data Locker being the more sinister and serious of the types. Here are the characteristics unique to the Cyber Extortion crime:

1. ​The action is an overt action, known by the Insured, usually because of failing systems or networks, inability to access data, or by direct communication from the extortionist.
2. The extortionist will make a demand for a specified sum of money. This may be a flat fee to gain the encryption key, or it may be an escalating amount based on the sooner you pay, the less the amount is to gain the encryption key.
3. The financial impact from an extortion attack varies by size and by type of data ransomed, but many suggest that it remains under $1000 on the average per attack. But this is not the entire tale of a business’ financial impact. There is risk of data loss/restoration cost, business interruption expenses for lost productivity and employee salaries, and in some cases, third party lawsuits from individuals impacted by inability to process business with you during any interruption period. However, in most extortion events the cost is not bankrupting.
 

Cyber Crime

Cyber Crime is very different and it involves the fraudulent instruction of payment, the electronic theft of funds of the business, deceptive invoicing, and telecommunications fraud among other things. Cyber Crimes are committed through use of social engineering devices, such as phishing or whaling, outside hackers, or rogue employees. Some of these criminals’ methods have become very sophisticated and hard to discern, and as a result, huge financial losses by all sizes and types of entities have occurred.

​Cyber Crime is the most likely event any one commercial entity will experience. Training employees and implementing various written authorization and voice verification procedures relating to electronic funds transactions should be a priority. Most of all, understand the method and motive of the Cyber criminal vs. the exortionist above:

1. The action is a covert action. The cyber criminal goes undetected, committing their crimes disguised as you or your employee or your vendor while completing illegitimate business transactions in a Cyber Crime event.
2. The intent of the cyber criminal is to commit their crimes without your knowledge, rather than with your knowledge and with a specific demand for you to perform an action. Therefore, there is no direct communication or instruction to the Insured with a ransom or demand.
3. The financial loss to a business is usually substantial, and average in the tens of thousands of dollars. For some entities, it has meant financial ruin.

​Protect your customer by knowing the threats and how to transfer that risk. US Pro wants to help your customer get the best coverage for the best rate for their business. Send us your Cyber submission today, or enter the information shown on our web page to get your quote. Simply click HERE to enter that information.

The First and the Worst

Posted by on Jan 12, 2017 in Cyber Source | Comments Off on The First and the Worst

Cyber Liability – What You Must Know

“Understanding the First and the Worst”

 

The First

Cyber Liability Insurance is the first insurance that any business should buy. It is the only insurance that is more likely than not to pay for an event that is otherwise unrecoverable without insurance.

​Consider any commercial business and its insurance portfolio. The actual exposure to the risk of a covered event under a Property or General Liability policy is smaller, more frequent events. Under Cyber, the exposure to the frequency risk of an event is less, but the exposure to severity from that event is very real. In fact, 60% of all businesses will go out of business within 12 months following an event. Almost all of these will be uninsured businesses.

​Therefore, if an event was to occur, with no Cyber Insurance in place a business is more likely than not to shut its doors for good. This means that all the other money paid out for all of their insurance will become useless if they cannot sustain operations as a result of the financial loss.

​Another aspect of Cyber Insurance vs. other insurance policies that a typical business will buy is the probability of an event occurring. Many respected industry organizations as well as national intelligence agencies have repeatedly claimed that all business is at risk, and it’s not a matter of “if” but rather a matter of “when” it will occur.

​Buying Cyber Insurance FIRST ensures that a business’ viability is better protected against severity of loss in the face of the high probability of an event occurring.

The Worst

Another very important reason that buying Cyber Insurance should be the first is because the average Cyber claim is also the worst. The average Cyber event as of 2015 can cost a business $190,000+ in total expenses. This average, once calculated, is suspected to rise over $200,000 in 2016.

​Another problem with Cyber exposures is that more events are occurring on a small cost scale, primarily Business Interruption losses and ransom payment from Ransomware events. Ransoms in 2015 paid out were $20 million. This figure rose to more than $1 billion in 2016.

​Add to this the explosion of Cyber Crime losses to business impacted by hacking, social engineering, or other means of theft of monies and/or property. So many of these events are occurring, and since many businesses who are currently insured do not have this coverage included, the losses are uninsured. These financial losses average in the 10’s of thousands to a business.

What to Do?

5 years ago we could count maybe a dozen carriers writing Cyber Liability Insurance. Today, there are dozens of programs, including coverage packaged into the P&C program a business has in place.

​The first thing to do is to understand what Cyber Liability Insurance really is- Property and Liability coverage protecting the digital assets of an insured against what we refer to as “non-physical fires”. It is a comprehensive package policy.

Knowing this, a business should never package its Cyber Insurance with any other package policy, or with a Management Liability program. Only Technology E&O and Cyber should be packaged together. Also, when presenting Cyber Liability options to your customer, bigger is not necessarily better- broader is better.

​A common misconception is that a standard carrier or the largest insurers in America have better coverage since they are bigger companies. This is a false narrative. While there are many competitive forms out their today, standard market or otherwise, the broadest carriers are the boutique Cyber carriers who have been writing this line of business for almost a decade.

These carriers evolve their coverages as quickly as new exposures emerge, and they have proven risk response experience. Broader coverage in Cyber will be the difference between an uninsured or underinsured risk, and financial peace of mind.

​Send US Pro your Specialty Lines or Cyber Liability submission for a quote today at ksneed@usproins.com.

Evil Ransomware is Lurking!

Posted by on Oct 27, 2016 in Cyber Source | Comments Off on Evil Ransomware is Lurking!

Trick or Treat?

Ransomware, a term which combines the words “ransom” and “software”, is a computer virus which prevents users from accessing their networks or computer systems until a ransom is paid. This kind of attack effectively relies on human error, and the network extortionists “trick” users into activating this malicious software.

Ransomware attacks, and others like it, have become rampant in 2016, and are expected to approach nearly 1 billion dollars in losses, according to the FBI. This is some very “scary” stuff and knowing what it is and how it happens can lessen the threat.

So here is how it works.

The virus itself is almost always embedded within an email, either as an HTML link or an attachment. Clicking on the embedded link or infected attachment will activate the virus. Once activated, all users are locked out of their machines, until such time as the ransom demand is paid. The virus encrypts the system’s data so that it is non-accessible. The information can then only be re-accessed using a private key that the criminals possess.

In order to pay the criminals, currency needs to be converted into the amount of ransom being sought, which is typically in the form of a Bitcoin. A Bitcoin is a digital currency that is highly used by Cyber criminals due to its ability to evade law enforcement.

In order to avoid such a “spooky” situation, make sure your customer takes these simple steps that can go a long way in keeping them safe this Halloween season and beyond:

1. Do not click on attachments from sources you do not know.
2. Do not click on suspicious or unusual attachments from sources you do know.
3. Never click on any link embedded in an email from sources you do not know.
4. Only click on a link embedded in an email from a source you know or if you are expecting it
5. Always use the mouse to roll over any link embedded in an email to verify its url source and credibility

Let US Pro “treat” you to America’s best Cyber, D&O, and Professional Liability programs! Simply send us your submission to ksneed@usproins.com today, and if you want to know a lot more about Cyber exposures, simply click on the Learn More link below. Don’t be “afraid”- it is a safe link!

Learn More

Hottest New Cyber Coverage!

Posted by on Oct 13, 2016 in Cyber Source | Comments Off on Hottest New Cyber Coverage!

The evolution of Cyber Liability and the many areas of exposure it should protect keeps expanding, and US Pro is at the forefront of this evolution each time.

The hottest new coverage is Dependent Business Interruption coverage. As businesses rely more on the digital world to run their operations, it comes with an increasing risk to a loss of income and additional expenses should an interruption occur

Many of today’s policies offer Business Interruption coverage if the interruption is caused by a security breach of their network. However, the coverage does not respond to an interruption of a third party provider’s network which causes an interruption of your customer’s business.

For example, if your customer is contracted with a firm to host its network, website, cloud storage services, etc. and their network gets interrupted, your customer’s operations also come to a halt. In these cases, traditional Business Interruption Coverage will not respond.

With the increasing reliance on other firms to run our own businesses, customers in these kinds of engagements need Dependent Business Interruption coverage. This coverage provides the Insured protection when that third party’s systems are interrupted, minimizing the financial impact of such an event.

 

Become an Online Cyber Producer!

As America’s Cyber Insurance Expert, US Pro Insurance Services invites you to gain access to online Cyber rating platform which is exclusively available only to US Pro customers!!

This exciting online system allows you to quote the leading Cyber coverage in the country right in your office. Best of all, your customer will enjoy the enhanced coverage benefits of the program.

Are you looking to produce Cyber quotes in less than 2 minutes which you can bind online?

Contact Kevin Sneed at ksneed@usproins.com to sign up today for this valuable new service offered by US Pro!

What’s In Your Cyber Coverage?

Posted by on Oct 13, 2016 in Cyber Source | Comments Off on What’s In Your Cyber Coverage?

Cyber Insurance is more than just an insurance policy.

It is really a complex series of coverage forming a digital fire package policy. An even more in depth look at the coverage reveals that each coverage is very specific and therefore, very different from carrier to carrier.

So you need to ask yourself the question “What’s in your Cyber coverage?” The answers may be very revealing for you. The following are just a few of many important rules of thumb to consider during the Cyber Liability purchase process:

1. Named Exclusion Policies: Be wary of carriers who spend more time defining what is covered rather than itemizing what is excluded. A named exclusion policy is always better. Under a good Cyber policy, language will be intentionally broad and loose in its nature, rather than limiting in scope by specific definition.

2. Coverage Triggers: Just what is it that triggers the coverage under the insuring agreement? There are many differences in what kinds of events cause the policy to respond, so choosing the wrong policy may leave your customer uninsured for certain types of events.

3. Insuring Agreements: Each carrier writes its own language for a Cyber Liability policy. This lack of universal approach by the market creates huge variance in the coverage. One of the biggest variances today is in the extent of the coverage provided by each insuring agreement in the policy. For example, Cyber Crime provided by many carriers offers less coverage than that provided by a leading carrier. Know the difference in these, as this really matters when a claim comes in.

US Pro is the best there is at recognizing and identifying gaps in existing coverage, as well as the correct placement of your customers into programs that will maximize their protection. Our knowledge of the coverage that leads to success for our agents is a big reason why we say the most important thing in Cyber Liability is “Be an expert, or use one.”

 

Become an Online Cyber Producer!

As America’s Cyber Insurance Expert, US Pro Insurance Services invites you to gain access to online Cyber rating platform which is exclusively available only to US Pro customers!!

This exciting online system allows you to quote the leading Cyber coverage in the country right in your office. Best of all, your customer will enjoy the enhanced coverage benefits of the program.

Are you looking to produce Cyber quotes in less than 2 minutes which you can bind online?

Contact Kevin Sneed at ksneed@usproins.com to sign up today for this valuable new service offered by US Pro!

The Dollar Impact of Employee Negligence

Posted by on Oct 13, 2016 in Cyber Source | Comments Off on The Dollar Impact of Employee Negligence

Like some other types of insurance, employees are the biggest risk to a business as the source of a cyber event. Unintentional employee negligence comes in many forms, and its impact to the Cyber Insurance industry as a whole is enormous. Consider some of these statistics that help define the impact of any one employee’s single mistake:

  • Average Cyber claim is more than $200K
  • Employee negligence causes more than 80% of all claims
  • Over 40% of all privacy breaches are caused by mobile devices lost by or stolen from employees.
  • Employees are number one target of phishing attacks
  • Employees are most likely cause of virus and malicious code downloads to a network.

Given the statistics above, more likely than not your customer’s own employees will unintentionally expose their business to a significant dollar loss. Without Cyber Insurance in place, they can then be exposed to being one of the 70% of businesses who go out of business following a privacy breach.

Simply put, a single Cyber claim event can close your customer’s doors for good. They simply can no longer afford to go without it.

How to Respond to the Top Reasons Insured’s Think They Have No Risk

Posted by on Aug 16, 2016 in Cyber Source | Comments Off on How to Respond to the Top Reasons Insured’s Think They Have No Risk

Answering Myths on Cyber Insurance

Cyber Insurance is becoming more common in terms of knowledge of its availability, and awareness of some of the kinds of events that can happen. This is a step in the right direction for commercial business, and will lead to more Cyber Insurance purchases.

However, there is continuing confusion on some key exposures and coverage elements that cross industry groups. This creates the common myths of Cyber Liability Insurance. Knowing how to respond to these myths with prompt and concise information is important to demonstrating your own Cyber expertise and to closing the sale.

We have made a list of the 3 most common mths we hear of and crafted for you a way to respond to these assumptions that commercial insured’s make. These will be invaluable to you as you begin quoting more and more of this coverage.

We Outsource, therefore, we have no risk.
Countless commercial enterprises outsource their data storage, networking systems, applications and programs, and other aspects of their digital fingerprints to third party providers and cloud storage services. This offshoring of information and security management comes with it a sense of invincibility or lessening of risk.

Part of this comes from the contractual language and hold harmless or indemnification agreements. While these are both important and a necessity, they are not a replacement mechanism for your legal liability should an event occur. Mores noticeably, they often do not provide coverage for third party claims against the Insured, but instead, focus solely on the cost to correct any errors.

Regardless of the type of outsourcing being done, the Insured will maintain two areas of liability that cannot be transferred: 1. The requirement to notify impacted individuals, and provide them with support services, and 2. The potential to be sued as a result of an event.

No data, therefore, no exposure
Another popular response from a potential Insured is that they do not collect or store any data of their customers, therefore, they have no exposure. For example, this is often a response from a manufacturer, or a commodities broker- businesses dealing in paper invoicing and no direct retail contact.

While the risk of a broad information breach is minimized with the lack of valuable PCI or PHI records, the theft of this information is only one of many different types of exposures any one business faces. A manufacturer relying on automated machine technology could have costly business interruption expenses if infected by a virus or a victim of an extortion event. A commodities broker dealing in electronic transfers of payments for orders could become a social engineering victim resulting in Cyber Crime losses.

Understanding the kinds of losses any one industry class faces underscored for the Insured the real risk they face.

We are too small to be a target.
In the world of Cyber Insurance, size does matter. The largest corporations, governmental entities and nonprofits maintain Cyber Insurance, mostly due to the threat they face as a target BECAUSE of their size. Alternatively, small entities in these same classes do not purchase Cyber Insurance for exactly the same reason- BECAUSE of their size.

The truth about small businesses, governmental entities, and nonprofits is they are at very high risk for a number of events, and it in fact is BECAUSE of their size. Smaller commercial entities have less resources devoted to the management and maintenance of technology they use to run their businesses. They are big users of cloud services and outsourced providers. They are easy targets for cyber extortionists.

Many are considered to be a minnow used to get to the bigger fish. A hacker will gain unauthorized access into your systems for the purpose of gaining access to an even larger business partner or governmental agency you communicate with. When successful, they can steal that third party’s information or infect their systems, leaving you responsible for allowing it through your systems.

The moral of the story here is that small business has the same threat of being a target as any other business does.

Experienced Cyber Liability Brokerage Makes A Difference.
Unlike other wholesale brokers, we are not just making Cyber easier to market. US Pro is a featured speaker to associations and industry groups about Cyber Insurance throughout America.

Our webinars and seminars are in constant demand. We spend a lot of time on the phone with you AND your insured’s, easing concerns, identifying exposures, and closing deals.

Cyber is not an ISO coverage, it is not another D&O form. It is the first insurance, the most important insurance, and the insurance to be most likely used by any commercial entity. Underinsuring your customer by making the wrong Cyber choices can be a very expensive choice to make.

When making your Cyber choice, choose an experienced broker. It matters. Send your submissions to us today at ksneed@usproins.com for same day turnaround service!