CYBER INSURANCE

Get insured and protect your future

WHAT IS CYBER INSURANCE?

AND WHY DO WE NEED IT?

invisible
DOWNLOAD YOUR FREE CYBER INSURANCE INFO PACK

Fill out the form below to get your FREE Cyber Insurance information pack: 

    I agree to CYBER123's terms and conditions

    BENEFITS OF CYBER INSURANCE

    The key benefit of having an Insurance Policy in your arsenal of security is that in the event of a breach where coverage is in place, you will have a policy that indemnifies you against a financial loss and the costs in rectifying the data breach.

    That’s got to be something worth considering for your business when you consider your clients and your data are probably the largest assets your business has.

    CYBER LIABILITY INSURANCE

    At the moment, cyber liability insurance cover can include;

    • Data breach/privacy crisis management cover. For example, expenses related to the management of an incident, the investigation, the remediation, data subject notification, call management, credit checking for data subjects, legal costs, court attendance and regulatory fines.
    • Multimedia/Media liability cover. Third-party damages covered can include specific defacement of a website and intellectual property rights infringement.
    • Extortion liability cover. Typically, losses due to a threat of extortion, professional fees related to dealing with the extortion.
    • Network security liability. Third-party damages as a result of a denial of access costs related to data on third-party suppliers and costs related to the theft of data on third-party systems.

     

    HOW TO START

    Click on the button above to contact us and we will run you through the quotation process

    SPECIALISTS IN CYBER SECURITY

    Here at CYBER123 we believe that prevention and training is the best way to secure your digital world. If we can train you on what things to spot, how scams and cybercrime works then we believe you are less likely to become a victim. Our unique training offers scenarios and advice on what to spot how to protect yourself and how to deal with the scams and frauds that are about in the world today.

    Understanding the resources that support critical functions and the related cyber security risks enable businesses to define resources and efforts in mitigating the risks

    CALL US:  +44 (0)20 3457 4683 EMAIL US: info@cyber123.com

    IT ONLY TOOK 5 MINUTES TO GET YOUR DATA

    If I have your work email address, generally, now I will have your first name and surname and the company you work for.

    WHAT TO DO IF YOUR INSTAGRAM ACCOUNT HAS BEEN HACKED

    Firstly, if your Instagram account has been hacked then there is a good chance your email has been hacked as well. What you would need to do first would be to report it to Instagram.

    TELEPHONE SPOOFING

    Telephone spoofing is easy to do, all you have to do is create an account on a website, enter a few telephone numbers and you get to call someone as if you were someone else.

    Is your child being Cyber Bullied

    Parents can find it difficult to tell the difference between the emotional development of their children or whether something more sinister is taking place.
    A lot of the times it is normal for growing children to have mood swings, quiet periods, manic periods and changes of emotional circumstance but sometimes these can also be a sign that they are being bullied or bullying others.

    From Xero to Zero

    To test and check the security of Xero online accounting software I wanted to see if they were susceptible to MITM attacks. I created a trial account and signed up and logged into Xero using standard 1FA (1 Factor Authentication –ie, password). I installed the Xero APP on my phone and Logged in being able to Skip MFA (Multiple Factor Authentication).

    Three Mobile Data Breach

    According to news reports some 6 million customer records have been stolen from Three Mobile (one of the UK’s largest mobile network providers). In order to commit this type of upgrade fraud the attackers must have used authorised login credentials to access the upgrades systems. Data accessed would have included names, phone numbers, addresses and date of births of customers.

    Three reasons to worry about worms

    Worms are a type of malware similar to viruses in that it is self-replicating. However, worms don’t generally attach themselves to applications. Why should you worry about worms?

    The Day the Internet Died

    Twitter, Spotify, Reddit, PSN and a whole load of other internet services and websites were down or left partially working on Friday. This happened when hackers launched an extremely large Distributed Denial of Service (DDoS) attack on Dyn DNS Servers. Dyn is a major host of internet DNS servers. It looks like Dyn was hit with up to 4 attacks lasting most of Friday.

    3 reasons to worry about spyware

    Obviously spyware is not something that you would like to have on your computer, tablet or mobile phone but should you be worried about spyware? Some of the stories I have heard are just scary!

    Are you infecting your customers?

    Earlier in the year mobile provide O2 had marketing campaign where they were promoting an e-book. To distribute their e-book they sent out free USB memory sticks to their customers. Unfortunately for them the e-book wasn’t the only thing on the USB sticks and unwitting customers that plugged the USB sticks into a windows devices found themselves infect with a virus.

    SIGN UP TO OUR NEWS LETTER

    Footer Contact

    11 + 9 =

    Share This