Healthcare Sector Continues to Be Targeted for Cybercrime
November 9, 2021
In a recent global cyber survey, the overwhelming majority of respondents ranked "cyber extortion/ransom" in the top three insurance categories that buyers were interested in purchasing. As the frequency of this type of cybercrime has increased, the need for coverage has become ever greater – even more so than cyber-related business interruption insurance.
ISMIE Mutual policyholders are ahead of the game: If eligible, your policy includes solid cyber liability coverage to protect you in the event of a claim. For eligible policies, higher limit coverage available.
We also offer a comprehensive resource on cybersecurity to help eligible policyholders develop and implement policies and procedures to protect against attacks. Key strategies include making sure you have current encrypted backups of all critical data stored offline or in separated networks, and having a well-rehearsed crisis response plan in case your systems (including email and VoIP-based phone systems) are compromised.
If you have any questions, please send an email to the Risk Management team
In a recent global cyber survey, the overwhelming majority of respondents ranked "cyber extortion/ransom" in the top three insurance categories that buyers were interested in purchasing. As the frequency of this type of cybercrime has increased, the need for coverage has become ever greater – even more so than cyber-related business interruption insurance.
ISMIE Mutual policyholders are ahead of the game: If eligible, your policy includes solid cyber liability coverage to protect you in the event of a claim. For eligible policies, higher limit coverage available.
We also offer a comprehensive resource on cybersecurity to help eligible policyholders develop and implement policies and procedures to protect against attacks. Key strategies include making sure you have current encrypted backups of all critical data stored offline or in separated networks, and having a well-rehearsed crisis response plan in case your systems (including email and VoIP-based phone systems) are compromised.
If you have any questions, please send an email to the Risk Management team