Thank you for submitting your Cyber Protection application!
You will soon receive a confirmation email and next steps for obtaining the coverage you need.
Return home / Start another application
Breach Cost

The direct costs of a breach stem from fines and lawsuits regarding the mishandling of data and the cost of investigation and remediation that occur as a result of the breach. When calculating the cost of a data breach, you need to take into account damages of all types; social media, negative public sentiment and damaged reputation all of which can surpass that of the actual crime itself.


A type of malicious software designed to block access to a computer system until a sum of money is paid. It is a type of malware that prevents or limits users from accessing their systems, locking the system’s screen, or locking the users’ files until ransom is paid. Modern ransomware families collectively categorized as crypto ransomware, encrypt certain file types on infected systems and force users to pay the ransom through certain online payment methods to get a decryption key. Crypto, bit, doge coin, thorium are common payment types.


The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. The term encompasses a broad spectrum of malicious activities. Most common attacks are phishing, pretexting baiting, quid pro quo, or tailgating. This truly is a criminal’s art of manipulating people and companies, so they give up confidential information. These criminal tactics are usually used in conjunction to exploit ways to hack your software.