Insure with a policy designed to match your profile, strengths and weaknesses

Be a Bright Tech-Savvy Ostrich and consider the following:

Insurance for Cyber events and related issues is still quite new. Insurers are still trying to:

  • Understand the risks that each client faces
  • Evaluate the possible costs relative to any breach/claim
  • Calculate a premium that will cover all claims during the insured period

It may well be some years before they have sufficient underwriting data to properly understand and calculate their exposure. A lot of claims will have to be made and paid before this accurate information is available.

You can present your business to insurers as a better than average risk if you follow the suggestions outlined here-in. You might benefit from wider policy terms and lower premiums in recognition of the efforts that you have taken.

You may decide that, with your new-found knowledge, insurance is not really required. Whilst we might understand such comment we would not suggest you gamble with the unknown.

Useful links

  • BGi.uk Cyber web pages Visit
  • Sample Cyber Policy Wordings
  • Cyber Training for ‘screen facing staff’ Visit
  • Basic scanning of any company’s web profile outlining areas of weakness and vulnerability Visit
  • In depth scanning of any company’s web profile outlining areas of weakness and vulnerability Visit
  • Full Cyber Audit to establish any weaknesses in any Company Visit
  • Secure e-mail, Registered e-mail; Signature required e-mail Visit
  • Understanding and dealing with GDPR regulations Read More
  • Data responsibilities summarised Read More
  • GDPR regulations explained Read More
  • GDPR on-line course Read More
  • Cyber Essentials – basic requirements Read More
  • List of Cyber-threat terms and explanations Read More
  • Cyber articles relative to the freight forwarding and shipping services
  • Cyber Articles relative to Intellectual Property
  • Cyber Insurance Application form Visit

Video 1 demonstrating Cyber-risks

Video 2 demonstrating Cyber-risks