Cyber Suite Spotlight: Computer Attack
Computers, networks and electronic data are important components of keeping an organization or business up and running. That’s why it’s necessary to be mindful of the risks that come with these tools and properly protect them.
Computer Attack Coverage helps our customers deal with the fallout from damaged computers and systems due to incidents such as virus infections, hacking, ransomware and distributed-denial-of-service (DDOS) attacks. This coverage includes:
- Restoration of data from electronic sources
- Re-creation of data from non-electronic sources
- Restoration of systems and software
- Loss of income
- Extended income recovery
- Public relations
Example: A hacker infected the computer system of a nonprofit organization with a virus. The infection corrupted software and caused the insured’s computer system to stop functioning properly, resulting in loss of electronic data. The insured hired an IT firm to remove the virus, reinstall software, and restore lost data. Computer Attack coverage helped recover costs paid to the IT firm.
Many times, Computer Attack coverage goes hand in hand with other coverages, such as Cyber Extortion or Data Compromise. Attacking a computer is the first step in allowing a criminal to hold a system ransom (extortion) or install a virus that grants access to sensitive personal information (data compromise). Because Cyber Suite includes these coverages, insureds are taken care of even when an incident falls within multiple categories – something not all cyber products can do.
For more information about Computer Attack coverage, contact your GuideOne Sales Director or Marketing Representative, or visit the Cyber Suite Resources page of GuideLink.
Read the series: A Benefits Overview, Computer Fraud & Misdirected Payment Fraud, Cyber Extortion, Data Compromise Response Expenses & Liability Coverages, Electronic Media Liability, eRiskHub Service, Identity Recovery, Network Security Liability
© 2022 The GuideOne Center for Risk Management, LLC. All rights reserved. This material is for informational purposes only. It is not intended to give specific legal or risk management advice, nor are any suggested checklists or action plans intended to include or address all possible risk management exposures or solutions. You are encouraged to retain your own expert consultants and legal advisors in order to develop a risk management plan specific to your own activities.