The Case for Cyber Liability Insurance

Written by Richard Smith—Commercial Insurance Risk Advisor

February 20, 2025 · 3 min minute read

Blog The Case for Cyber Liability Insurance

Our increasing dependence on the internet, email, and online databases may make us more efficient, but it also puts us at increased risk of sensitive materials falling into the wrong hands. Technology is changing daily and the ways in which information is collected, distributed, and even hacked, can change in an instant.

Have questions?
Contact us today.

Phone: (614) 451-2232

I consent to receive SMS messages from Leavitt Group Midwest. Reply "STOP" to opt-out, "HELP" for assistance. Message and data rates may apply. Messaging frequency may vary. Privacy Policy

Please note: coverage cannot be bound or altered online. A service representative will need to contact you to finalize your request.

Protecting Your Business from a Cyber Breach

Cyber liability insurance (more accurately called information security and privacy liability insurance) is rated based on the amount of information at risk – number and size of records, nature of records, type of business or service provided, and revenue. Coverage differs from carrier to carrier, but these policies typically address both prevention (“pre-event”) and reaction (“post-event”) to data security breaches, and they often include valuable loss control and risk management services.

The value of digital data is often overlooked – until it is compromised. To better understand informational and digital assets, think of them as you would physical assets in any other risk management scenario. Having a full grasp and inventory of information collected, stored, or managed is the key to being prepared for any breach event.

5 Key Questions to Assess Cyber Exposure

Below are some of the key pieces of information to discuss with your insurance agent. This will help your agent determine the type of coverage that’s really needed.

  1. What proprietary information do you collect, manage, or store?
  2. What confidential personal information do you collect, manage, or store from your clients and your employees? Examples would include:
    • Protected card information (credit card information, online commerce, etc.)
    • Personal healthcare information (health records, social security numbers, etc.)
    • Personal information (name, address, age, driver’s license numbers, income, insurance, etc.)
  3. What confidential business information do you collect, manage, or store from your clients? (credit card information, banking information, address, revenues, other information subject to confidentiality agreements, etc.)
  4. In what ways do you collect, store, or manage information? (i.e. paper files, electronic database or server, etc.) How is this information protected? (i.e. locked up, encrypted, etc.)
  5. Do you employ third parties or outside vendors to handle proprietary information? (i.e. document disposal, digital backup, etc.) Do you outsource any information technology?

Responding to a Cyber Crisis

Did a privacy breach occur? Was it a single event or ongoing? How many records were exposed? Now what? In which states do you have to notify individuals of the breach? What should those notifications say? Should you issue a press release?

Technology is complicated, and responding to a breach event is no different. Loss control and risk management services provided by your insurance company are invaluable in helping you find the best experts (forensic, legal, public relations, etc.) to navigate these difficult issues. Reacting too quickly can cost more than necessary. So simply knowing who to call when a breach occurs can often help mitigate a crisis tremendously and provide peace of mind.

5 Key Questions to Assess Cyber Preparedness

To determine how prepared you are in the event of a cyber crisis, ask yourself the following questions.

  1. Who is responsible for information security with your organization? Does this individual oversee or select information-related third party vendors?
  2. Do you have a formal information security policy in place? If so, are all employees trained on it?
  3. What loss control initiatives are in place for information security?
  4. Much like a formal disaster preparedness plan,
    • Do you have a formal procedure in place for a data breach incident?
    • What is your formal process in notifying clients/customers of a potential breach?
    • Are you aware of the state statutes regarding notification and regulatory compliance in a breach event?
  5. Are there funds set aside for these notification expenses, identity theft/credit monitoring services, and any public relations or advertising campaign to combat a bruised public image?
  6. What is your protocol for lost electronics, such as cellphones or laptops? How would you address the loss of digital assets on such property?

Conclusion

Cyber liability insurance is still new territory and tends to be approached with hesitancy or even a bit of skepticism. The exposure is real, and it affects both large and small companies. Savvy companies are doing everything they can to protect their information assets, especially from a technology perspective. Our goal is to help you get the right information by asking the right questions.

Have questions? Contact:

Richard Smith

Richard Smith

Commercial Insurance Risk Advisor

Call: (614) 545-1523
Book an Appointment»

At Leavitt Group Midwest, I enjoy leading the real estate, technology, and manufacturing risk practice divisions. Before joining Leavitt Group, I worked for Oracle in the technology industry and sold financial software applications for large fortune 1000 companies.

Anyone will offer you a policy for your business, but I often find that people lack the coverage they need to protect themselves properly. My goal is to help my clients understand the current value their insurance is offering them, help them find any issues, and then show them how I can help them find the coverage they need.

I was born and raised in Columbus, Ohio. I attended Ohio State University and earned my bachelor’s degree in business administration. When I’m not working, you might find me rock climbing in Mad River or Red River Gorge, attending OSU athletic events, traveling, or volunteering to make our community a better place.

Education

Bachelor’s of Business Administration, Ohio State University

...

Read Richard's full bio

Connect with us