Cyber Risk Insurance Piergiorgio Venuti

Cyber Risk Insurance

Cyber Risk Insurance

In the light of the recent cyber attacks and the rise of ransomware (like WannaCry and Petya), Secure Online Desktop in collaboration with Broker Busani Stefano of Union Brokers (see BROKER PRESENTATION) is pleased to present the Cyber Risk Assurance Guarantee as a valuable tool to increase The security of your data.

Cyber Risk Insurance – Description

The Cyber Risk Insurance Guarantee protects the customer even if the damage was caused by him. It protects you from all claims for damages even if the damage is due to:

  • – error;
  • – Negligence;
  • – Breach;
  • – Omission of duties;
  • – Serious blow;
  • – Abuse for:
    •  – violation of Network Security;
    •  – Malware;
    •  – Hacking;
    • – D.O.S. (Denial of Service) attacks;
    • – Unauthorized access or use;
    • – Privacy.

It also covers Cyber extortion: the sums that the insured pays to end an Cyber-Extortion event (i.e. a threat received to the computer system in order to claim money from the insured).

It also includes loss of data: caused by human error, programming error, blackout, malicious informatics, D.O.S. attacks, malware, hacking, unauthorized use or access.

It covers all the expenses that arise from these events and covers the expenses for lawyers, perpetrators and costs incurred.

When unfortunately these events happen, the company stays at times for days, sometimes unfortunately for weeks!

The Cyber Risk Insurance Guarantee also covers the economic losses that have caused your business to stop!

 

[btnsx id=”2931″]

To whom does it turn?

This product is aimed at all small and medium-sized companies with a turnover of less than € 25million. Excluding retailers.

 

What do you need to do in practice?

To sign up for the policy, simply contact us and we will follow the client to analyze the degree of risk of his activity by setting the right security for the Cyber event.

 

Business Case

Prestigious 5-star hotel in Tyrol (Austria), the keys to all hotel rooms are electronic keys on the board, hackers take over the hotel’s computer system and block the opening of all the doors to the hotel rooms. Clients are panicky, while hacking requests for tens of thousands of euros – the hotel has no choice: it pays. The policy reimburses the hotel how much the hotel paid to hackers.

USEFUL LINKS:

 ♦ Cloudflare extension

 ♦ Stay in control of your fast moving data

[btnsx id=”2931″]

Share


RSS

More Articles…

Categories …

Tags

RSS Dark Reading:

RSS Full Disclosure

  • Backdoor.Win32.DarkKomet.irv / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/a229acff4e0605ad24eaf3d9c44fdb1b.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.DarkKomet.irv Vulnerability: Insecure Permissions Description: DarkKomet.irv creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated user group. Standard users can rename...
  • Trojan.Win32.Pluder.o / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/ee22eea131c0e00162e4ba370f396a00.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pluder.o Vulnerability: Insecure Permissions Description: Creates an insecure dir named "z_Drivers" under c:\ drive, granting change (C) permissions to authenticated user group. Pluder.o also creates several registry key...
  • Trojan.Win32.Pincav.cmfl / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/9d296ebd6b4f79457fcc61e38dcce61e.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan.Win32.Pincav.cmfl Vulnerability: Insecure Permissions Description: The trojan creates an insecure dir named "Windupdt" under c:\ drive, granting change (C) permissions to authenticated users group. Standard users can rename the...
  • Trojan-Proxy.Win32.Daemonize.i / Remote Denial of Service February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/61bec9f22a5955e076e0d5ddf6232f3f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Trojan-Proxy.Win32.Daemonize.i Vulnerability: Remote Denial of Service Description: Daemonize.i listens on TCP port 5823, sending some junk packets to the trojan results in invalid pointer read leading to an access violation and […]
  • Backdoor.Win32.Ketch.h / Remote Stack Buffer Overflow (SEH) February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/63c55ad21e0771c7f9ca71ec3bfcea0f.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Ketch.h Vulnerability: Remote Stack Buffer Overflow (SEH) Description: Ketch makes HTTP request to port 80 for a file named script.dat, after process the server response of 1,612 bytes or more it […]
  • Backdoor.Win32.Inject.tyq / Insecure Permissions February 23, 2021
    Posted by malvuln on Feb 23Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/833868d3092bea833839a6b8ec196046.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Inject.tyq Vulnerability: Insecure Permissions Description: The backdoor creates an dir named "hotfix" under c:\ drive granting change (C) permissions to the authenticated user group. Type: PE32 MD5:...
  • IBM(R) Db2(R) Windows client DLL Hijacking Vulnerability(0day) February 23, 2021
    Posted by houjingyi on Feb 23A few months ago I disclosed Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability I found : https://seclists.org/fulldisclosure/2020/Oct/16 In that post I mentioned "I will add more details 90 days after my report or a security bulletin available". Here it comes. NOTICE : This vulnerability seems did not get […]
  • CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189) February 23, 2021
    Posted by David Coomber on Feb 23CIRA Canadian Shield iOS Application - MITM SSL Certificate Vulnerability (CVE-2021-27189)
  • [KIS-2021-02] docsify <= 4.11.6 DOM-based Cross-Site Scripting Vulnerability February 20, 2021
    Posted by research on Feb 19-------------------------------------------------------------- docsify
  • Backdoor.Win32.Bionet.10 / Anonymous Logon February 19, 2021
    Posted by malvuln on Feb 19Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/be559307f5cd055f123a637b1135c8d3.txt Contact: malvuln13 () gmail com Media: twitter.com/malvuln Threat: Backdoor.Win32.Bionet.10 Vulnerability: Anonymous Logon Description: The backdoor listens on TCP port 12348 and allows anonymous logon credentials to be used to access an infected host. Type: PE32 MD5: be559307f5cd055f123a637b1135c8d3 Vuln ID:...

Customers

Newsletter