Cyberattack Plugin Test – Cyber Attack Insurance

Speak With Our Team Now 800-624-0919

Please share a bit about your business
5 Minutes is all we ask.
We are working behind the scenes to speed up the process. Preventative Care Cyber Coverage that is ready when you are. Main office address is all we need. A previous claim may increase ’s premium, but won’t disqualify them from coverage. A potential cyber incident won’t automatically disqualify for coverage. Our underwriting team will review each individual situation. Discounts offered for companies that encrypt their data. PII (personally identifiable information) and PHI (protected health information) includes data such as health information, social security numbers, credit or debit cards numbers, driver’s license numbers, and similar info. All of our policies include full prior acts coverage. Tech E&O is necessary for those offering technology products or services. Tech E&O covers third party damages from negligence, failure to meet contractual obligations, or failure of products or technology to work as intended.
We'll use this information to fetch additional data and speed up your quote. We offer comprehensive cyber coverage across industries, and for all company sizes. Use only the main headquarters address if there are multiple offices. A previous claim may increase ’s premium, but won’t disqualify them from coverage. A potential cyber incident won’t automatically disqualify for coverage. Coalition will review each individual situation. We offer premium discounts to companies that encrypt their data. PII (personally identifiable information) and PHI (protected health information) includes data such as health information, social security numbers, credit or debit cards numbers, driver’s license numbers, and similar info. All of our policies include full prior acts coverage. Tech E&O is necessary for those offering technology products or services. Tech E&O covers third party damages from negligence, failure to meet contractual obligations, or failure of products or technology to work as intended.
cpu
network
regulatory defense
media liability
pci
Injury and Property Damage - 3rd party
Polution
technology errors and omissions
Breach Response
Crisis Management and Public Relations Coverage
cyber extortion
business interruption
asset restoration
Funds Transfer Fraud
reputation
computer replacement
Service Fraud
Bodily Injury and Property Damage - 1st Party

An employee loses a laptop with the private data of your customers or a hacker breaches your computer’s defenses and steals your data. These events can trigger mandatory reporting obligations, or worse, resulting in your company being sued. We help you resolve these incidents, including hiring legal counsel and covering legal judgments.

Data breaches are damaging enough, but they can also result in state and federal investigations and penalties to your business. We’ll cover the costs to manage any investigation as well as any penalties levied against you (subject to applicable law).

Thanks to the Internet, any company with a public website is subject to the same exposures and litigation of a traditional media company. We’ll indemnify you against claims for defamation, invasion of privacy, trademark and copyright infringement, and other multimedia wrongful acts.

Your customers’ credit card information was stolen. Don’t worry. We’ll cover any PCI fines or assessments made against you. If you weren’t aware, all businesses that accept or store credit card information are subject to the Payment Card Industry’s Data Security Standards (PCI DSS).

A hacker gains access to an industrial control system or Internet-connected device. The attack may come from cyberspace, but the physical impact is real. We cover the costs of defense and any liability you incur when a failure in your security results in physical damage or injury.


Sub-limit may apply; see your policy for details.

A hacker gains access to an industrial control system or Internet-connected device. A resulting system failure triggers the release of pollutants. We cover the costs to defend you and any liability you might have to a 3rd party resulting in the release of pollutants.


Sub-limit may apply; see your policy for details.

If a technology product or service that you sell doesn't work as intended, or worse, results in losses for your customers, you could find yourself at the end of a lawsuit. We help you resolve these situations by covering the costs of defense and any legal liability you incur from such an error or omission.

Incidents happen. When they do, we’re ready to help you recover and maintain the confidence of your customers. We’ll provide expert counsel, and cover the costs of forensics, notification, and incident response efforts to help make you whole.


For limits $5 million or less, the limit for this coverage is separate from and in addition to the Aggregate Policy Limit of Liability

When an incident occurs, it’s often more than just your data that is damaged. In your time of crisis, we’ll provide and cover the costs of consultants, public relations, and notification services so that you can control the narrative.

A hacker has encrypted all of your files and won’t unlock them until you pay a ransom. Not to worry, we’ll cover the costs to get you up and running again.

A hacker uses a denial of service attack to take down your website. Your cloud provider goes down as the result of a network outage. We not only cover your lost income, but any extra expenses to get your business back online.

Your network is hit by a ransomware attack. Your data may be held hostage, but your business doesn’t have to be. We’ll cover the costs to fix the problem and restore data that is corrupted or lost.

A funds transfer request is sent to your controller by someone pretending to be the CEO. The funds may be out the door, but at least you’re not out of pocket—we’ve got you covered.


Sub-limit and separate retention may apply; see your policy for details.

When an incident occurs, it’s often more than just your data that is damaged. In your time of crisis, we’ll provide and cover the costs of consultants, public relations, and notification services so that you can control the narrative.


Reputation Repair coverage enhances Crisis Management coverage, with expanded coverage for advertising and media purchases and consulting costs to help you preserve customer confidence and protect your brand.

A malware infection alters the firmware of your computers. Their integrity may be comprised, but your business won’t be. We cover the costs to repair or replace any affected systems.


Sub-limit may apply; see your policy for details.

A hacker gains access to your cloud infrastructure (network, servers, telephony, etc.) and drives up your bill mining for virtual currencies. We'll reimburse you for the loss incurred as a result of these malicious acts.


Sub-limit may apply; see your policy for details.

A hacker gains access to an industrial control system or Internet-connected device. The attack may come from cyberspace, but the physical impact is real. We help you recover, by covering your business interruption losses and extra expenses (including tangible property) to restore your business operations to normal.


Sub-limit may apply; see your policy for details.

[error_message]
No problem! We'll assume <100K on the application. You can always edit this later.
Are you sure? A dual control process is required in order to be eligible for Funds Transfer Fraud.