PROTECTION BEFORE AND AFTER A CYBER INCIDENT

We cover up to $20M in damages with our innovative insurance. Our coverage is inspired by evolving digital risks, providing a comprehensive offering with protection when policyholders need it most.

Privacy and System Breach Response
We provide cyber specialists 24/7 for immediate incident response, we also cover costs to help you recover from the breach.


Business Interruption
In the case of a privacy or system breach, we will pay for loss of business income and extra expenses.


Consequential Reputational Damage
If your business loses money as a result of damage to your reputation, we will reimburse you.


Cyber Extortion and Ransom
We will provide a forensic consultant, opportunity to negotiate with the extorter and digital data restoration costs.


Cyber Crime and Social Engineering

This covers fraudulent wire transfer instructions, funds held in an escrow account, invoice manipulation and telephone system breach.


Third Party Cyber Liability

If a third party accuses you of a Privacy/System Wrongful Act we will cover costs.


Multimedia Liability

We cover costs from a claim made against you by a third party alleging a Multimedia Wrongful Act.


Fines, Regulatory Expenses, GDPR Infringement

We cover costs for regulatory fines and noncompliance with GDPR.


PCI Fines, Penalties and PCI DSS Expenses
We will cover PCI DSS Fines & Penalties as a result of a PCI DSS Assessment.

MORE THAN JUST INSURANCE

We believe in educating and protecting our customers against digital risks which is why we also provide free DETECTION and PREVENTION tools to all policyholders. 

PREVENTION

DETECTION

PREVENTION

#DigitalRisk policyholders are granted complimentary access to the following suite of risk management security services: 

CYBERSECURITY EXPERTS & PRIVACY ATTORNEYS


Telephone and email advice to advise you on risk assessment, cyber risk mitigation, data breach prevention and response.

ONLINE KNOWLEDGE CENTRE


Over 500 compliance materials and cyber risk management resources:

  • Sample policies, procedures and agreements
  • A Cyber Fitness Check
  • Incident Response Planning 
  • Industry-Specific guidance such as HIPAA, PCI and GLBA and much more.
ONLINE TRAINING CENTRE


Keep your employees informed on key Privacy and Data Security issues:

  • Courses on Data Security basics, Phishing Attacks and Social Engineering, 
  • Industry Specific Courses on HIPAA & PCI;
  • Guides and posters
  • Monthly Webinars.

DETECTION

Early alerts can help reduce the negative impact a cyber event can have on a business. We can help spot potential security issues before they even have a chance to happen.

MONITORING SERVICES 24/7


We detect and alert policyholders of potential security issues. Our Security Experts execute hundreds of domain/email/network/
dark web and social media scanning/monitoring services 24/7 to protect our policyholder’s Digital Systems.

FIX SECURITY ISSUES


A remote Node Security coach is available to help remediate and mitigate business interruption and harm at no additional cost. If we detect a problem on your network we can work with you or a third party to help fix the issues.

CYBERSECURITY EVALUATION REPORT


We can provide you with a report showing your digital weaknesses. Node Detect runs the domains, provided by the policyholder, against our list of breached credentials. These exposed emails and passwords are found on the dark web as well as through private and public data breaches.

WORK WITH US 

Provide your clients with market-leading cybersecurity insurance and complimentary access to effective risk management & security services.

FAQ’s

Get prompt responses from a friendly, professional and knowledgable support team.

What is Cyber Liability Insurance?

Node’s Cyber product #DigitalRisk1.0 covers financial losses resulting from data breaches and other cyber events, also known as cyber liability insurance or data protection insurance. It is there to ensure that your company is safe from cybercrime issues such as hacking, data theft and social engineering, where criminals try to fool you out of money, information or both. It also covers data breaches that include unintended disclosure of sensitive information.

What is a Phishing Attack?

Phishing is a type of social manipulation attack that is often used to capture user data, including username and credit card numbers. It happens when an attacker, disguised as a trusted person or entity, dupes a victim to open an email, instant message, or text message. The recipient is then tricked into clicking a malicious link which can cause malware to be installed, the system to freeze and Ransomware to be installed.

What is Ransomware?

Ransomware is malicious software intended for one purpose: The extortion of money from its victims. It is one of the most popular crime business models in existence today, largely due to the multi-million dollar ransoms that criminals seek from individuals and corporations. Such requests are very simple: pay the ransom, or have the business activities severely compromised or completely shut down.

What exactly is PII?

Personally Identifiable Information, or PII, is any data that could be used to recognise a particular person. Definitions include a full name, Social Security number, driver’s license number, bank account number, passport number and/or email address.

What is Dual Factor Authentication on Wire Transfers?

Dual Factor Authentication on Wire Transfers relates to the confirmation of Payee details prior to sending the funds across. The dual or second factor would be a method of confirming or challenging the communication in a channel outside of the original request (Email, phone, communications app, etc.)

Interested in Cyber Insurance?

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Youtube
Consent to display content from - Youtube
Vimeo
Consent to display content from - Vimeo
Google Maps
Consent to display content from - Google
Spotify
Consent to display content from - Spotify
Sound Cloud
Consent to display content from - Sound