Forth Tech is able to offer cyber and data risks insurance to protect your most valuable assets from a wide range of online threats.
Cyber and data risks insurance is designed to support and protect your business if it experiences a data breach or is the subject of an attack by a malicious hacker that affects its computer systems. It provides comprehensive cover, simplicity, reputation protection and a trusted partner in the event of a claim.
COSTS YOUR BUSINESS MAY INCUR FOLLOWING AN INCIDENT
- Ransomware – Cyber extortion – Insurance protects you if a hacker tries to hold your business to ransom by covering the ransom you have paid, as well as the services of a leading risk consultancy firm.
- Breach costs – We offer practical support in the event of a data breach including forensic investigations, legal advice, notifying customers or regulators, and offering support such as credit monitoring to affected customers.
- Cyber business interruption – We will provide compensation for loss of income, including where caused by damage to your reputation, if a hacker targets your systems and prevents your business from earning revenue.
- Hacker damage – We will reimburse you for the costs of repair, restoration or replacement if a hacker causes damage to your websites, programs or electronic data.
- Crisis containment – We provide expert support to mitigate reputation damage in the event of a data breach, prompt, confident communication it is critical to help minimise the damage to a company’s reputation. We include crisis containment cover with a leading public relations firm who can develop communication strategies and even run a 24/7 crisis press office.
AMOUNTS YOU MAY BE LIABLE TO PAY TO OTHERS
- Privacy protection
We will pay to defend and settle claims made against you for failing to keep customers’ personal data secure. We will also pay the costs associated with regulatory investigations and settle civil penalties levied by regulators where allowed.
- Multimedia liability
The policy includes protection if you mistakenly infringe someone’s copyright, for example by using a picture online without permission, or inadvertently libel a third-party in an email or other electronic communication.