how to become cyber insurance ready

How to Apply for Cyber Insurance

The following are the key elements that insurance companies are looking for to qualify your business for cyber insurance coverage.
Your best resource is a Staebler Broker who can help you navigate cyber insurance.

They can make sense of what’s required from you and provide recommendations to help protect your business’ valuable assets.

Special thanks to our network solutions partner Fortify for their assistance and expertise with this information.

get your business cyber insurance ready

ACCESS CONTROL

  • Password Policy – complexity and forced regular changes
  • Multi-Factor Authentication – for multiple access points
  • Remote Access – Work From Home security
  • Password Management – software to securely store
  • Zero Trust Network Access (ZTNA) Strategy
  • Dark Web Research and Monitoring

PERIMETER

  • Firewall – implemented and managed
  • Web Content Filtering – browsing the Internet is filtered
  • Intrusion Detection System (IDS) – detect attacks

PATCH & UPDATE

  • Operating Systems – servers and workstations
  • Applications – individual user software
  • Devices – firmware and systems

DATA

  • Databases – encrypted at rest
  • Other Data and Files – encryption at rest
  • Backups – frequency, transferred offsite, testing of restoration, data AND critical servers/workstations

MONITOR & SCANNING

  • Network Monitoring – detects performance issues
  • Vulnerability Scanning – perimeter, applications, devices
  • Penetration Testing – test ability to break in to network
  • Security Information & Event Management (SIEM)
  • Security Operations Centre (SOC)

DOCUMENTATION & PROCESS

  • Business Continuity & Disaster Recover Plan
  • Email & Internet Usage Policy – including social media
  • Incident Response Policy
  • Security Policy – how is information secured and stored?
  • Change Management/Control Procedure

EMAIL

  • Filtering – scanning emails for threats and spam
  • Advanced Threat Protection – sandboxing of attachments
  • DNS Management – email authentication/validation such as SPF, DKIM, Sender ID, or DMARC
  • Data Loss Prevention

PEOPLE & BEHAVIOUR

  • Cybersecurity Awareness Training and Testing
  • Physical Building Security Measures

DEVICE SECURITY

  • Virus/Malware Protection – servers & workstations
  • Endpoint Detection & Response – servers & workstations
  • Mobile Device Management – secure and manage access
  • Asset Management – track and cycle older devices

Get A Quote

Fill in the form and one of our brokers will contact you soon.

Cyber Insurance

Why Insure with Staebler?

Working with a broker brings experience, expertise, and advocacy to you and your organization. With an individual broker, you have the ability to personalize your insurance solutions for your unique needs. Find out why there are 7 Really Good Reasons to use an Insurance Broker.

Did you know? Staebler Offers Commercial Premium Financing »

Blue banner with

Related Blog Posts

Preventing Violence in the Workplace

Cyber Crime

Business Interruption Trivia Time In the previous post, we asked the question: According to recent statistics, approximately how many identity theft complaints per month do Canada?€?s largest credit bureaus receive? Answer: Statistical information from Equifax and...

read more
Preventing Violence in the Workplace

Business Interruption

Business Interruption Trivia Time In the previous post, we asked the question: According to recent statistics, approximately how many identity theft complaints per month do Canada?€?s largest credit bureaus receive? Answer: Statistical information from Equifax and...

read more
Preventing Violence in the Workplace

Cost of Risk

I recently came across an article entitled "Risk Calculator".  The article touched on some familiar concepts for Risk Managers; "Cost of Risk", but it certainly does apply to all business owners.  If you go to the internet you will find many different perspectives on...

read more
Preventing Violence in the Workplace

Cyber Liability: What’s at risk?

At a 2012 Cyber & Privacy Risk conference changes in cyber risk were noted: 1. Cyber attacks have become pervasive 2. current defensive systems aren't working, and 3. Cyber risk is getting bigger and broader. The Office of the Privacy Commissioner of Canada (OPC)...

read more
Preventing Violence in the Workplace

Insurance Business Risks

Every day business owners face a number of liabilities, many of which can be insured with that well known Commercial General Liability (CGL) insurance policy.  But where are the 'gaps' and why are they there?  Can you do anything about them? Coverage limitations...

read more