{"id":123,"date":"2017-10-16T17:46:57","date_gmt":"2017-10-16T17:46:57","guid":{"rendered":"https:\/\/rm73v2idht.onrocket.site\/?p=123"},"modified":"2022-11-22T18:49:30","modified_gmt":"2022-11-22T18:49:30","slug":"why-does-my-company-need-cyber-liability-insurance","status":"publish","type":"post","link":"https:\/\/blog.integrityfirstins.biz\/?p=123","title":{"rendered":"Why Does My Company Need Cyber Liability Insurance?"},"content":{"rendered":"<p><a href=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-124\" src=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted.png\" alt=\"Gadgets-In-Business-Vacation-Shopping-Banners-[Converted]\" width=\"800\" height=\"263\" srcset=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted.png 800w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted-300x99.png 300w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted-768x252.png 768w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/Gadgets-In-Business-Vacation-Shopping-Banners-Converted-500x164.png 500w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a>Today\u2019s businesses are more reliant than ever on technology.\u00a0 Whether it\u2019s an app, a device, or a piece of software, a business can save time and money. \u00a0However, this technology may expose them to multiple cyber risks that need to be addressed. \u00a0An unhappy ex-employee, a lost cell phone, an insecure password, an out-of-date computer system &#8211; these may all be a possible source of a data breach.<\/p>\n<p><strong>What is a data breach?<\/strong><br \/>\nAccording to the Ponemon Institute, a breach is defined as an event in which an individual\u2019s name and a medical record and\/or a financial record or debit card is potentially put at risk\u2014either in electronic or paper format.<\/p>\n<p>Verizon found in their 2015 Data Breach Investigations report that about 50% of all security incidents are caused by people within your organization! \u00a0The other 50% are caused by hackers, viruses, malware, etc.\u00a0 The people in your organization may not have caused the breach maliciously, but through human error or some other negligence.<\/p>\n<p><strong>Amazing Data Breach Facts<\/strong><\/p>\n<p>According to <a href=\"https:\/\/www.ofcom.org.uk\/research-and-data\/media-literacy-research\/adults\/adults-media-use-and-attitudes\">Ofcom\u2019s \u201cAdults\u2019 Media Use and Attitudes Report 2013\u201d<\/a>, 55% of adults use the same password for everything. \u00a0Therefore, when one data breach occurs, about 55% of the passwords and information recovered can possibly lead to another breach, which can lead to another, etc. It\u2019s easy to see how you can have a secure system, but if it\u2019s not protected by secure employees, a data breach could easily occur.<\/p>\n<p><a href=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-125 size-medium\" src=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password-300x200.jpg\" alt=\"login with email and password\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password-300x200.jpg 300w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password-768x512.jpg 768w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password-450x300.jpg 450w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2017\/10\/login-with-email-and-password.jpg 1008w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The average cost per lost or stolen record in a data breach is $141 dollars according to the 2017 Ponemon Institute Data Breach study.<\/p>\n<p><strong>How many records is your company responsible for? \u00a0<\/strong><\/p>\n<p>When there is a breach in Pennsylvania, you are responsible for notifying each owner of those records that their data has been compromised. \u00a0Not only have you lost or diminished the trust of your clients, but you will spend a large amount of money informing them of this fact.<\/p>\n<p>Because your clients can reasonably expect that you will protect their data, failing to do so can also result in federal and\/or state fines. \u00a0Make sure that you are taking all reasonable steps to protect your data.<\/p>\n<p><strong>How can you protect your company from a data breach?<\/strong><\/p>\n<p>The first step that you can take is to purchase a cyber liability insurance policy. This allows you to transfer the risk to the insurance company and know that you are covered in the event of a data breach. \u00a0For the cost of a nice laptop (under $1500), you can purchase a standalone cyber liability policy.<\/p>\n<p>This policy will help with a number of things when it comes to a data breach.\u00a0 Most policies will cover the cost of notification, finding the breach source, fixing the source, restoring your clients\u2019 trust, fines and more.\u00a0 Before you purchase a policy, review the coverage available and ensure that you are fully covered.<\/p>\n<p>The second step that you can take is to train your employees well and make sure that you have office procedures in place to ensure your security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today\u2019s businesses are more reliant than ever on technology.\u00a0 Whether it\u2019s an app, a device, or a piece of software, a business can save time and money. \u00a0However, this technology may expose them to multiple cyber risks that need to &hellip; <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=123\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-123","post","type-post","status-publish","format-standard","hentry","category-cyber-liability-insurance"],"_links":{"self":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123"}],"version-history":[{"count":1,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/123\/revisions"}],"predecessor-version":[{"id":126,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/123\/revisions\/126"}],"wp:attachment":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}