We are very much a society that relies on being online. Whether it is searching for something, buying online or simply scrolling through social media.  There are many aspects of business that are either fully or partially online now.

Your business may have a website that you sell products through, which captures customers personal details including their address and credit card details. Or you may have an online system that clients are able to log into and make changes to their account and details. Many businesses will also have social media account where people can follow your business, learn about what you do and see different content that you are sharing.

Cyber theft is a big risk when taking your business online. Cyber-attacks are unfortunately becoming more predominant, and it is important that you are taking the steps to cover not only your business but also your clients and customers from being victim to these attacks.  There are several different ways that your business can be negatively affected if a cyber-attack takes place.

Cyber criminals target information that can be quickly turned into cash with little effort. For example:

  • Personal identifiable information: such as drivers license, address an email addresses
  • Government ID numbers: access numbers that people use to log in to their government portals
  • Medical Records: including confidential medical history and medication lists
  • Payment card data: PayPal, credit card and bank details so they can access another person’s funds
  • Email address databases: where they can take the peoples email addresses and either contact them themselves or use their email addresses in fraudulent activity
  • Customer websites: They may take over another person’s website, change content or steal the information that is recorded in it
  • Client records: client records can be ones that are housed on your own cloud based software, on your hard drives or through your website where clients have their own personal records account

The concept of Cyber Liability considers first and third-party risks. This includes privacy issues, the infringement of intellectual property, virus transmission, or any other serious trouble that may be passed from first to third parties via the web.

Your policy may assist you in being able to get back the information that has been accessed. It can also help with getting virus scans and programs installed on your systems to avoid another attack happening and it can also be used to launch an investigation into who, how and why your information was accessed.