What we offer
Personal Lines Cyber combines advanced risk management and proactive crisis response services with comprehensive insurance to protect your policyholders against cyber attacks.
Personal Lines Cyber coverage can be embedded in other insurance (such as homeowners insurance), banking or telecommunications portfolios in two ways:
- Automatic inclusion in the entire portfolio
- Opt-out basis
The product can also be tailored to your needs by selecting different types of coverage packages.
How can we help
Beazley is a market leader in cyber insurance. We understand the evolving risk landscape, how to prevent attacks and mitigate the risk should an incident occur. Our policy is not only comprehensive, but streamlined and easy to understand and can be adapted to
Coverage includes necessary and reasonable costs for the following types of incidents:
- Identity theft – fraudulent use of a social security number or other identifying methods to acquire credit such as mortgages or loans, after the incident has been reported in writing to the police.
- Home system compromise – data recovery and system restoration following a cyber attack such as unauthorized access or use and/or a malware attack.
- Cyber extortion – professional support for a cyber extortion event as well as reasonable cyber extortion response costs.
- Cyber bullying – expenses such as counselling, replacement wages, relocation expenses and a professional security firm.
- Online fraud – fraud costs including direct financial loss after an incident being reported in writing to the police.
The Beazley Difference
Freedom lies in being bold. We dare to be different and seek bold possibilities to create more innovative, fair and satisfying outcomes for our clients, brokers and employees. From insuring the highest building in the world, to the first commercial lunar vehicle to operate on the moon - we boldly go where others won’t.
STRIVING FOR BETTER
Good is a start, but we go all-out for better. A driven community of individuals relentlessly push the needle and creating value. From launching the market’s first dedicated ESG syndicate to the establishment of our business unit focusing on designing digital insurance solutions, we pride ourselves on always going above and beyond. Simply put, at Beazley we go to 11.
DOING THE RIGHT THING
Acting with integrity in a straightforward, decent way is instinctive. Open and honest with others, we show respect and empathy however challenging the situation – demonstrated by our multi-award winning claims team. Doing the right thing makes for a fair-minded, rewarding environment and makes work and life better for all.
Examples or Scenarios
The incident response team will work closely with your policyholders to better understand their needs and partner with them to resolve their claim efficiently and effectively.
A policyholder provides their personal credit card details on an unsecure online payment form. A cyber criminal hacks into the form and steals the credit card number. The criminal then uses the credit card information to commit fraud. The policyholder discovers unauthorized purchases on their statement.
In this type of scenario, the insured would be reimbursed for the reasonable and necessary identity theft expenses that the insured incurs as a result of an identity theft event that the insured first discovers during the policy period and after it has been reported in writing to the police.
This includes administrative and out-of-pocket expenses incurred while trying to restore or protect the insured’s identity to the position before the identity theft event.
Home system compromise
A hacker breaks into the policyholder’s home router and infiltrates all the devices connected to the
network, including computers, mobile phones, and tablets. Through the router, the hacker introduces malware and viruses and accesses all stored information. There was no ransom demand so the insured is unaware of the problem until their bank notifies them about an unusual transfer request.
In this scenario, the incident response team commences a forensic investigation, searches the dark web and verifies that data from the insured’s bank accounts is being used. All devices are cleaned, banking application passwords are changed, and all the data is deleted from the web. The
insured is advised to strengthen the security of the router and all connected devices.
The policyholder would be reimbursed for the reasonable and necessary home system compromise costs as well the costs to regain access, replace or restore their data.
A policyholder unintentionally clicks a link on a website which infects the computer with ransomware. The data is now encrypted and there is a demand for ransom money in exchange for releasing the data back to the insured.
In this scenario the policyholder would be reimbursed for the reasonable and necessary cyber extortion loss incurred as it was reported in writing to the police and occured during the policy period.
The phone of a policyholder’s adolescent is hacked and a conversation is posted on a public website.
The adolescent is threatened and abused by third parties and experiences psychological suffering.
The adolescent refuses to go back to school and the policyholder reports the situation to the police.
In this scenario, the incident response team undertakes forensic analysis. All published information is removed from the website, and the mobile device is cleaned. In this scenario the policyholder would be reimbursed for psychological counseling expenses for the adolescent as well as any other reasonable and necessary cyber bullying expenses incurred.
A policyholder receives an email that appears to be from a work colleague. The email looks legitimate and includes a request from the sender to open an attachment as a matter of urgency. The insured opens the attachment and has now granted a third-party software company access to their emails and contacts. Hackers use spoofing and phishing scams like this to retrieve the insured’s sensitive personal information.
In this scenario, the policyholder would be reimbursed for any online fraud loss and cover reasonable and necessary online fraud expenses as a direct result from of an electronic funds transfer.