Cyber Risk Insurance Piergiorgio Venuti

Cyber Risk Insurance

Cyber Risk Insurance

In the light of the recent cyber attacks and the rise of ransomware (like WannaCry and Petya), Secure Online Desktop in collaboration with Broker Busani Stefano of Union Brokers (see BROKER PRESENTATION) is pleased to present the Cyber Risk Assurance Guarantee as a valuable tool to increase The security of your data.

Cyber Risk Insurance – Description

The Cyber Risk Insurance Guarantee protects the customer even if the damage was caused by him. It protects you from all claims for damages even if the damage is due to:

  • – error;
  • – Negligence;
  • – Breach;
  • – Omission of duties;
  • – Serious blow;
  • – Abuse for:
    •  – violation of Network Security;
    •  – Malware;
    •  – Hacking;
    • – D.O.S. (Denial of Service) attacks;
    • – Unauthorized access or use;
    • – Privacy.

It also covers Cyber extortion: the sums that the insured pays to end an Cyber-Extortion event (i.e. a threat received to the computer system in order to claim money from the insured).

It also includes loss of data: caused by human error, programming error, blackout, malicious informatics, D.O.S. attacks, malware, hacking, unauthorized use or access.

It covers all the expenses that arise from these events and covers the expenses for lawyers, perpetrators and costs incurred.

When unfortunately these events happen, the company stays at times for days, sometimes unfortunately for weeks!

The Cyber Risk Insurance Guarantee also covers the economic losses that have caused your business to stop!

 

[btnsx id=”2931″]

To whom does it turn?

This product is aimed at all small and medium-sized companies with a turnover of less than € 25million. Excluding retailers.

 

What do you need to do in practice?

To sign up for the policy, simply contact us and we will follow the client to analyze the degree of risk of his activity by setting the right security for the Cyber event.

 

Business Case

Prestigious 5-star hotel in Tyrol (Austria), the keys to all hotel rooms are electronic keys on the board, hackers take over the hotel’s computer system and block the opening of all the doors to the hotel rooms. Clients are panicky, while hacking requests for tens of thousands of euros – the hotel has no choice: it pays. The policy reimburses the hotel how much the hotel paid to hackers.

USEFUL LINKS:

 ♦ Cloudflare extension

 ♦ Stay in control of your fast moving data

[btnsx id=”2931″]

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • Kigen eUICC issue (custom backdoor vs. FW update bug) August 12, 2025
    Posted by Security Explorations on Aug 12Dear All, On Jul 28, 2025 we provided Kigen with a report describing new security issue potentially affecting company's eUICC cards. We did it regardless of Kigen refusal to provide us with patches / patching instructions, so that we could verify the content / quality of the fixes released […]
  • PlayReady Activation protocol issues (weak auth / fake client identities) August 12, 2025
    Posted by Security Explorations on Aug 12Dear All, PlayReady Communication Protocols [1] include services for PlayReady clients (such as Secure Clock), device owner's services (Activation / Provisioning) and content service (License Server). Back in 2022, we reported to Microsoft an issue pertaining to no auth at PlayReady license server end, which was evaluated by Microsoft […]
  • Defense in depth -- the Microsoft way (part 91): yet another 30 year old bug of the "Properties" shell extension August 5, 2025
    Posted by Stefan Kanthak via Fulldisclosure on Aug 04Hi @ll, this extends the previous post titled Defense in depth -- the Microsoft way (part 90): "Digital Signature" property sheet missing without "Read Extended Attributes" access permission , to document another facette of this 30 year old bug in the "Properties" shell extension. About 35 years […]
  • Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical) August 3, 2025
    Posted by Sandro Gauci via Fulldisclosure on Aug 02Rtpengine: RTP Inject and RTP Bleed vulnerabilities despite proper configuration (CVSS v4.0 Score: 9.3 / Critical) - CVSS v4.0 - Exploitability: High - Complexity: Low - Vulnerable system: Medium - Subsequent system: Medium - Exploitation: High - Security requirements: High - Vector: https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:H/SI:H/SA:H - Other references:...
  • APPLE-SA-07-30-2025-1 Safari 18.6 August 3, 2025
    Posted by Apple Product Security via Fulldisclosure on Aug 02APPLE-SA-07-30-2025-1 Safari 18.6 Safari 18.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124152. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. libxml2 Available for: macOS Ventura and macOS Sonoma Impact: Processing a […]
  • Defense in depth -- the Microsoft way (part 90): "Digital Signature" property sheet missing without "Read Extended Attributes" access permission July 30, 2025
    Posted by Stefan Kanthak via Fulldisclosure on Jul 29Hi @ll, about 35 years ago Microsoft began to implement their "New Technology File System" (NTFS) for their upcoming Windows NT operating system. NTFS supports the extended attributes of the HPFS file system which Microsoft and IBM had developed for their OS/2 operating system before. NTFS' initial […]
  • St. Pölten UAS 20250721-0 | Multiple Vulnerabilities in Helmholz Industrial Router REX100 / mbNET.mini July 30, 2025
    Posted by Thomas Weber | CyberDanube via Fulldisclosure on Jul 29St. Pölten UAS 20250721-0 ------------------------------------------------------------------------------- title| Multiple Vulnerabilities in REX100 product| Helmholz Industrial Router REX100 / mbNET.mini vulnerable version| < 2.3.3 fixed version| 2.3.3 CVE number| CVE-2025-41673, CVE-2025-41674, CVE-2025-41675, | CVE-2025-41676, CVE-2025-41677, CVE-2025-41678,...
  • APPLE-SA-07-29-2025-8 visionOS 2.6 July 30, 2025
    Posted by Apple Product Security via Fulldisclosure on Jul 29APPLE-SA-07-29-2025-8 visionOS 2.6 visionOS 2.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124154. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afclip Available for: Apple Vision Pro Impact: Parsing a file may […]
  • APPLE-SA-07-29-2025-7 tvOS 18.6 July 30, 2025
    Posted by Apple Product Security via Fulldisclosure on Jul 29APPLE-SA-07-29-2025-7 tvOS 18.6 tvOS 18.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124153. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afclip Available for: Apple TV HD and Apple TV 4K (all […]
  • APPLE-SA-07-29-2025-6 watchOS 11.6 July 30, 2025
    Posted by Apple Product Security via Fulldisclosure on Jul 29APPLE-SA-07-29-2025-6 watchOS 11.6 watchOS 11.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/124155. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afclip Available for: Apple Watch Series 6 and later Impact: Parsing […]

Customers

Newsletter

{subscription_form_1}