“Do I Really Need Cyber Insurance?”

“Do I Really Need Cyber Insurance?”

Short Answer: YES.?

Longer Answer: Clients, prospects, and other IT Providers ask me this on the regular. In fact, in June, I was asked to speak to 3,000 IT Providers and internal IT about this very thing.??

Insurance does not protect you from major incidents, it transfers risk related to ransomware incidents. This means you need to assess the risk cyber incidents may pose to your business and implement strategies to mitigate that risk.??

What does that look like? If you’re an InTech client, we’re having Strategic IT or Risk Management Meetings with you were we are assessing the risks together and bringing forward potential solutions to mitigate the risks.??

If your IT provider doesn’t do this with you, the insurance questionnaire is a great mechanism to get your organization talking about the risks – and what changes you should make to mitigate them.??

Every business will have an Incident, so you need to assure you’ve got an Incident Response Plan (IRP). You should also be performing tabletop exercises (a walkthrough of how you respond to an incident) AT LEAST once a year.?

You also need to thoroughly understand your cyber insurance policy requirements for what actions you need to take when you have an incident. If your MSP responds and that response is not in line with your policy requirements, they could void the ability for your claim to be paid.?

And please, please, please, DO NOT simply hand your insurance questionnaire to your IT Provider and expect them to answer it without you. You must understand the questions and answers. This is YOUR application and you're signing it, so it’s your risk.?

No alt text provided for this image

LEIA SHILOBOD – CEO of InTech Solutions, CISM, author of Cyber Warfare: Protecting Your Business From Total Annihilation and The Three Indisputable Rules Every Manufacturer Must Know Before Purchasing Any IT Product or Service and staring in the new movie: Cybercrime – The Dark Web Uncovered.

As a cyber security advisor and CMMC Compliance SME, Leia speaks frequently and has been heard at IT Security Conferences, Harvard, IUP, and MEP’s.

Also known as the “IT Princess of Power," Leia saves mid-market firms from hackers and keeps them compliant by delivering enterprise-class IT security solutions that would otherwise be cost prohibitive.

Ivan I. Usero MS, CRIS

Senior Risk Advisor - Property & Casualty - International Man of Surety

2 年

Happy to help your clients with this, and any other questions they have in the commercial property & casualty space.

Jim Goodrich

CCA, Cybersecurity, Quality Auditor @ CPISys | ISO, CMMC Compliance

2 年

Thanks Leia Shilobod, CISM, this is too important to ignore.

Mark Anthony Germanos

“AI for Beginners” Author | Cybersecurity Trainer | vCISO. Helping you bridge AI and cybersecurity. You get more done in less time and grow your business securely.

2 年

If you're in healthcare and if you do incur ransomware, and you miss payroll, your best people will feel your business is about to die. They will leave. That ransomware check from the insurance company can help you pay the OCR fines. It will not help you recover your reputation after sending out the embarrassing press release or get your best people to return. #cyberinsurance

要查看或添加评论,请登录

Leia Kupris Shilobod, CCP, CISM的更多文章

  • “Readjusting Your Head And Your Bottom Line”

    “Readjusting Your Head And Your Bottom Line”

    These last 2 years have been quite the journey, and no one can deny the impact it has had on our people, our…

    13 条评论
  • "It Is Only Up to Us"

    "It Is Only Up to Us"

    What words can you use to describe meeting and hanging out with a legend? Humbling? Amazement? Awe? I think it's…

    3 条评论
  • What You Need to Know About Computer Encryption for CMMC Compliance

    What You Need to Know About Computer Encryption for CMMC Compliance

    A question our Clients ask all the time is, "Do we need to encrypt our computers for CMMC compliance?" The short answer…

    3 条评论
  • The 4 Laws Of Combat

    The 4 Laws Of Combat

    Several years ago my team group studied Jocko Willink’s books, Extreme Ownership. The premise of the book is that no…

  • The Biden Administration Response: Strong and Proactive, or Information Power Grab?

    The Biden Administration Response: Strong and Proactive, or Information Power Grab?

    In the wake of the Colonial Pipeline Hack we saw action taken and red alerts by the government at all levels. This is…

  • “How InTech Is Responding To The Pipeline Hack: An Open Letter To My Clients”

    “How InTech Is Responding To The Pipeline Hack: An Open Letter To My Clients”

    In the wake of the Colonial Pipeline Hack, our community of Clients, Prospective Clients, and Colleagues have asked us…

    3 条评论
  • You Can Always Take One More Step

    You Can Always Take One More Step

    Earlier this month I had the opportunity to meet with, learn from, and work out with James Lawrence. James is also…

    1 条评论
  • “Extreme Productivity”

    “Extreme Productivity”

    The last year has produced massive failures in businesses, but also amazing successes. For some of us, the world…

  • There Is Nothing Magical About January 1st

    There Is Nothing Magical About January 1st

    Do you notice that we always seem to think things will be better in the future? In a different time, or a different…

  • “The World Needs You”

    “The World Needs You”

    As the Chair of the Board of Trustees of Westmoreland Community College, I give a speech at commencement. This year…

社区洞察

其他会员也浏览了