What's at stake?

Your data. Your customers. Your bottom line. And your reputation.
What you can do.

Find an Agent

An independent insurance agent can help you make the choices that are right for you.

Step 1: Know your data

Create an inventory of all data and information - digital or physical - along with where it is stored, including:

  • Customer records, including account numbers and passwords, credit card data, social security numbers, private health information, etc.
  • Business financial information
  • Trade secrets
  • Authentication credentials
  • Employee records

Step 2: Evaluate your cyber exposure

Understand which information and systems are most critical to protect. Then, determine the ramifications of a cyber attack on each. Consider the following:

Previous
Next

What is the nature and sensitivity of the data?

Different types of data will require different levels of protection. All companies collect and store data – make sure you determine what level of information your company has by conducting an inventory.
Previous
Next

How is data collected, stored, used, shared and destroyed?

Maintain critical oversight of all data related policies and procedures to ensure every link in the chain is secure. Consider any third parties involved in your processes.
Previous
Next

Is your company required to protect its data?

Most likely it is. There are a variety of federal and state statues as well as regulations requiring companies to protect private data. And if data is compromised cyber insurance can help cover many of the legal and regulatory costs associated with a breach.
Previous
Next

What would a cyber attack cost your company?

Consider all expenses that would result from a cyber attack or data breach, including:
  • Forensics and investigations
  • Victim notifications
  • Retrieval or restoration of data
  • Crisis management
  • Public relations
  • Lawsuits
  • Loss of customers
Previous
Next

Is your company susceptible to a cyber attack or data breach?

Yes, even the most sophisticated systems have vulnerabilities and the human element of lost laptops, misplacing a paper file or opening an email attachment can effect your company. As no system is fool proof there is a need for cyber insurance to cover expenses associated with a breach.

Step 3:  Cover your assets

No risk management plan is complete without cyber insurance. Travelers cyber insurance solutions are robust, scalable and designed to address the broad array of exposures in today’s digital world.

Travelers Casualty and Surety Company of America and its property casualty affiliates.
One Tower Square Hartford, CT 06183

This material does not amend, or otherwise affect, the provisions or coverages of any insurance policy or bond issued by Travelers. It is not a representation that coverage does or does not exist for any particular claim or loss under any such policy or bond. Coverage depends on the facts and circumstances involved in the claim or loss, all applicable policy or bond provisions, and any applicable law. Availability of coverage referenced in this document can depend on underwriting qualifications and state regulations.

©  The Travelers Indemnity Company. All rights reserved.
Connect with usFacebook Twitter YouTube Linkedin