You are about to leave Risk Strategies website and view the content of an external website.
You are leaving risk-strategies.com
By accessing this link, you will be leaving Risk Strategies website and entering a website hosted by another party. Please be advised that you will no longer be subject to, or under the protection of, the privacy and security policies of Risk Strategies website. We encourage you to read and evaluate the privacy and security policies of the site you are entering, which may be different than those of Risk Strategies.
Today, thanks to mobile broadband, we all have more data at our fingertips than we did even 15 years ago.
While this evolution has great advantages, there are also associated risks. Although commercial and corporate attacks garner the media attention, individuals are still also at risk, especially successful individuals and families.
Here are some of the cyber risks you face:
How Can You Protect Yourself
Claims Examples:
Posing as the Boss
When the personal assistant received an email request from her employer asking her to transfer $150,000 into the brokerage account of a familiar sounding third party, she assumed it was a legitimate request and processed it. When she received another email from her employer later that week asking for a second transfer of $90,000, she became suspicious.
Although this email, like the one prior, was sent from her boss’s personal email account and included his customary signature and private details of his personal account, something seemed off, prompting the personal assistant to investigate. A phone call revealed that neither request was actually from her employer. Unfortunately, the $150,000 was gone.
Another Unauthorized Transfer
A client of Concentric Advisors noticed a transfer of $25,000 from his account. Upon contacting the bank, he learned that the transfer was made by someone entering his correct username and password in the online banking system. He visited his local bank branch where he changed his login credentials.
Once home, he logged in again from his computer. A short time later, another unauthorized transfer was made. Because his home Wi-Fi and router were not properly secured, the attacker was able to gain access to the connection and log all traffic and credentials being entered.
Does my insurance coverage these scenarios?
Maybe. Cyber loss coverage is carrier-specific and generally very limited or not covered at all. The good news is that insurance carriers are now rolling out specialty lines products specifically for these new risks. Even better, the costs associated with these protection policies are often quite economical.
The contents of this article are for general informational purposes only and Risk Strategies Company makes no representation or warranty of any kind, express or implied, regarding the accuracy or completeness of any information contained herein. Any recommendations contained herein are intended to provide insight based on currently available information for consideration and should be vetted against applicable legal and business needs before application to a specific client.