Every company is a technology company these days, so a robust information technology (IT) security and an appropriate cyber insurance policy is part of any comprehensive IT security approach - acting as a final line of defence and a form of risk transfer.
When it comes to cyber cover, we know that one size doesn't fit all. That's why we look at risks, businesses and their security objectively, considering what is necessary and what is overkill.
The cyber insurance application form
While we've made our application form as simple as possible, with most questions needing a simple "yes" or "no", we know many customers still find the process onerous. That's why we want to explain why we ask the questions we do on a cyber insurance application form, and why they're so important – to business owners and us.
Our underwriting approach is risk based. The more information you can give us about how you mitigate particular cyber risk, the better we can make informed decisions about your cyber maturity.
Not everything you read about here will be appropriate for all businesses. What might be a worst case scenario for one business may have little to no impact for another. Many customers will have total reliance on their IT/security provider, but with any service that is outsourced, the risk is still owned by the business.
We've broken elements of cyber security down into sections covering infrastructure, software and systems, emails and data, passwords and access, and last but by no means least, people. In reality, there's lots of overlap, but we hope you find this a useful overview.