Responding to a Cyber Breach Takes a Team

Travelers umbrella logo.
By Travelers
2 minutes
business team responding to a data breach in the office

Small and mid-sized businesses may be the most vulnerable, and least prepared, to handle a data breach. Without employees trained to handle the technology, legal and public relations questions that a breach can bring, the effects on the business can be catastrophic.

The number of cyberattacks increase every year and “almost all events require a team of people working together,” said Tim Francis, Travelers Enterprise Cyber Lead. “One of the worst things we see is when companies try to go it alone.”

Before a breach: Protecting data and training employees

Pre-breach services, from employee training to cyber assessments, can help companies protect their systems and their data and make them better able to withstand an attempted attack. Backing up critical data and training employees to recognize and report a breach sooner can be critical steps in containing the damage.

As part of our offering of pre- to post-breach solutions, Travelers has partnered with various cybersecurity companies to offer Travelers cyber customers access to various risk management resources, including training videos, a cyber resilience readiness assessment and a consultation with a cybersecurity professional to help identify areas of weakness or vulnerability.

Managing a breach: Knowing where to start

Travelers has created a network of cyber specialists to help manage the fallout of an attack. A cyber breach coach is an attorney specializing in cybersecurity events who can guide businesses in taking the right steps to recover in the critical hours and days following an attack. Acting as a first responder, the breach coach helps triage response efforts, including isolating affected data, notifying customers and retaining forensics professionals.

After a breach, a company’s data is a virtual crime scene. Handling it properly requires a specialized skill set. The cyber breach coach can assemble a digital forensics team to help a company understand the scope of a breach, piece together and preserve evidence and help prevent future breaches.

Cyber breaches can also require a specialized crisis communications plan, especially if customers’ Personally Identifiable Information (PII) or Protected Health Information (PHI) is involved in the breach. The cyber breach coach might recommend that the company retain a crisis public relations professional to help protect the company’s brand and reputation, which may be covered by cyber insurance.

After a breach: The road to recovery

Even a seemingly small breach can disrupt a business and render its systems and computers inoperable. “We know that when it comes to businesses that rely on technology, minutes matter,” Francis said. “Having the right team can help your business recover sooner.”

If a breach does take place, small to mid-sized businesses need not only an insurance policy that can help reimburse them for their expenses, but also access to a network of experienced professionals. “At Travelers, our claims professionals, coupled with our partners that are experts in cybersecurity solutions, can bring the right solution to your particular event.”

The right coverage your business or organization needs depends on your level of risk.

Learn more about cyber insurance from Travelers.

Illustration cyber security practices in place with a red padlock.

Top stories

5 Cyber Readiness Practices to Boost Your Cybersecurity

Cyber risk is a top concern across all businesses. Improve your defense and explore five cyber safety best practices to help boost your company's security.

Related Products & Services

Broad cyber liability coverage customized to fit the needs of small businesses to Fortune 500 companies and every organization in between.

Specifically tailored and available with a Business Owners Policy to protect small businesses with essential coverage related to cyber threats.

More Prepare & Prevent

The Dark Side of the Internet

The Dark Web can make cyber breaches profitable for thieves — and they don’t even need to be skilled hackers. It’s like one-stop shopping for the tools needed to commit and profit from cybercrime.

Hacker using dark web for cyber breach.

More Prepare & Prevent

How Does Cyber Insurance Work?

What is cyber insurance coverage and how does it work? Get the answers and learn about the different types of cyber insurance coverage with Travelers.

Graphic of secure cybersecurity practices.

More Prepare & Prevent

What Is the Ransomware Landscape?

Ransomware continues to be one of the top malware threats, targeting users of all types. View this infographic to learn more.

Person checking laptop for ransomware.