Skip to main content

Full Coverage Newsletter #3

By October 10, 2022October 12th, 2022Insurance

Welcome Back to Bickle Insurance’s
Full Coverage Newsletter!

Since October is National Cybersecurity Awareness Month we have gathered 3 important sections to prepare you for any cyber risk! These sections will go over your possible cyber exposures, risks, and scenarios as well as give you effective cybersecurity measures to keep you and your information safe!

Personal Cyber Coverage Explained

Today’s society has grown increasingly digital in nature, with many individuals leveraging smart devices within their daily lives. Although this technology can offer various benefits, it can also make individuals more susceptible to cybercrime. Such incidents have steadily become more common and costly. In fact, the FBI reported receiving more than 800,000 complaints regarding cybercrimes in the past year, totaling $4.2 billion in overall expenses!

These findings emphasize how critical it is for individuals to safeguard themselves and their families from cyber events. That’s where personal cyber insurance can help. Typically offered as an endorsement to a homeowners policy, this form of coverage can provide financial protection for losses resulting from a range of cyber incidents—including fraud, identity theft and data breaches. Keep reading to learn more about the growing need for this coverage and the key types of personal cyber insurance available.

The Growing Need for Personal Cyber Coverage

While digital devices certainly offer several advantages, increased technology utilization also comes with greater cyber vulnerabilities. As technology advances, so do the tactics of cybercriminals—resulting in more frequent and severe cyber events.

Here are some of the most common cyber incident scenarios that individuals and their families may encounter:

  • Bank fraud—This form of fraud entails a cybercriminal gaining unauthorized access to an individual’s electronic bank credentials, allowing them to transfer and steal funds from the individual’s account. According to a recent report from NortonLifeLock, cybercriminals steal over $170 billion each year via bank fraud.
  • Identity theft—Such theft refers to a cybercriminal accessing an individual’s personal information (e.g., Social Security number or credit card number) and using it to commit fraud or other crimes under the individual’s name. The Federal Trade Commission confirmed that nearly 1.4 million complaints related to identity theft were filed last year, up 113% from the previous year.
  • Data loss—In the event that an individual’s device gets infected with a virus or other malicious software (also called malware), they face the risk of losing any valuable data stored on that device. Viruses and malware can come from numerous avenues, including harmful websites, dangerous email attachments or infected USB flash drives—thus making data loss a major threat.
  • Extortion—Ransomware incidents have contributed to a substantial rise in cyber extortion over the last few years. These incidents stem from a cybercriminal using malware to compromise an individual’s device (and any data stored on it) and demanding a ransom payment in exchange for restoration. In some cases, the cybercriminal may even threaten to publicly share the individual’s data if they don’t receive payment. According to cybersecurity experts, ransomware incidents have increased 500% since 2018, with the average ransom payment totaling over $300,000.
  • Cyberbullying—While social media platforms allow individuals to connect with others, these platforms can also, unfortunately, be used for negative purposes, such as cyberbullying. This type of bullying includes refers to harassment, threats or other intimidating language that occurs via electronic means. Although anyone can be a victim of cyberbullying, kids and teenagers are particularly vulnerable. The latest data from Pew Research revealed that 59% of teens have experienced cyberbullying.

Considering these risks, it’s clear that individuals can’t afford to ignore cybercrime. In addition to implementing effective cybersecurity practices (e.g., using trusted devices, browsing secure websites, conducting software updates, backing up data, creating unique passwords and knowing how to identify potential scams), having adequate insurance in place is crucial. By investing in personal cyber coverage, individuals can properly protect themselves and their families amid cyber-related losses.

Types of Personal Cyber Coverage

Personal cyber insurance varies between insurers. However, there are a number of key coverage offerings available:

  • Online fraud coverage—This coverage can offer reimbursement for financial losses that may result from the various types of online fraud, such as phishing scams, identity theft or unauthorized banking.
  • Online shopping coverage—Such coverage can help pay for the cost of any goods that were purchased online but arrived damaged upon delivery or didn’t get delivered whatsoever.
  • Identity recovery coverage—This coverage can provide reimbursement for the expenses associated with recovering from an identity theft incident (e.g., rectifying records with banks or other authorities, hiring a consultant to assist with credit restoration and taking unpaid time off from work to recover from the incident).
  • Data restoration coverage—Such coverage can help compensate the cost of having an IT specialist recover a device and restore any data stored on it if the device gets infected with a virus or malware.
  • Data breach coverage—This coverage can offer reimbursement for the necessary notification and recovery services in the event that private, nonbusiness data entrusted to the policyholder becomes lost, stolen or published.
  • Cyber extortion coverage—Such coverage can help pay for the expenses associated with responding to a ransomware event (e.g., consulting an IT specialist to mitigate the extortion attempt and restoring compromised devices or data).
  • Cyberbullying coverage—This coverage can provide reimbursement for the costs that come with recovering from a cyberbullying incident resulting in unlawful harassment or defamation of character. These costs may include psychological counseling services, legal advice, temporary relocation expenses and social media monitoring software. This coverage can also offer protection if an individual or their child faces engages in cyberbullying and faces subsequent legal action from the victim.

Because personal cyber insurance is still a relatively new type of coverage, it is usually only available as an add-on to an existing homeowners policy. Individuals should consult trusted insurance professionals to discuss their specific coverage capabilities. 

Protect Your Identity

According to the U.S. Federal Trade Commission, identity theft is the fastest-growing crime in the United States. Once a victim of identity theft, you could spend an average of $1,500 and 175 hours to get your life back in order. Though that statistic may be alarming, you can stay one step ahead of identity thieves with the following safety precautions.

Mail Precautions

  • Retrieve your mail every day from your personal mailbox.
  • Drop outgoing mail, especially bills and other payments, into a secure, locked mailbox.
  • Pay attention to when you should receive bills.
  • When traveling, have your mail held at the post office or ask a neighbor to pick it up for you each day.
  • If you move, notify the post office of your new address.
  • Don’t leave important mail in an unsecured location, even if it’s a place you think things are secure.

 

Personal Items and Information Precautions

  • Carry only what you absolutely need to, and keep an itemized list at home of what you carry.
  • Provide your personal information to businesses on a “need to know” basis only.
  • Ask your financial institution to omit your Social Security number and driver’s license number from your checks.
  • Write “see ID” on the backs of your credit cards instead of signing them.
  • Use a shredder to destroy personal and financial documents that you do not want to keep

 

Diligence Is Key

Identity thieves will steal your wallet, purse or laptop, pick through your mail, dig through your garbage, hack into your personal devices or stage email and cellphone scams to obtain your personal information. They’ll stop at nothing to obtain as much personal or financial information about you as they can to take advantage of you for their own benefit. To thwart identity thieves, you must be diligent about protecting your personal property and information.

Watch for These 6 Phishing Scams

Phishing is a type of cyber fraud that utilizes deceptive emails or other electronic communication to manipulate recipients into sharing sensitive information, clicking on malicious links or opening harmful attachments. While emails are the most common delivery method of phishing attempts, cybercriminals may also use:

  • Voicemails
  • Live phone calls
  • Text messages
  • Fake or misleading websites
  • Social media messages

 

Here are six of the most common types of phishing scams to watch out for:

  1. Deceptive phishing is when a cybercriminal impersonates a recognized sender to steal personal data and login credentials.
  2. Spear phishing is typically aimed at specific individuals or companies by using personalized information to convince victims to share their data.
  3. Whaling aims to trick high-profile targets such as CEOs, CFOs and COOs into revealing sensitive information, like payroll information or intellectual property.
  4. Vishing is sometimes called “voice phishing” and occurs when a criminal calls a target’s phone to get them to share personal or financial information.
  5. Smishing refers to “SMS phishing” and incorporates malicious links into SMS text messages.
  6. Pharming redirects a victim to a site of the cybercriminal’s choosing by installing a malicious program onto their computer.

 

To protect against all types of phishing scams:

  • Remain informed about phishing techniques.
  • Examine a message before clicking.
  • Back up data regularly.
  • Never give out personal Information.
  • Use anti-virus software.
  • Keep computer systems up to date.

 

Phishing scams are becoming more sophisticated and severe. By taking the proper precautions, organizations can minimize their damage.

We hope these articles provided you with more education on why cybersecurity is so important and what you can do to prepare yourself against any exposures.

For more information on cybersecurity contact us today to speak with an experienced advisor!

 

Not sure if you’ll be able to call during business hours? Or maybe you had a quick question and couldn’t get to your phone?
We know you’re busy and we want to make it easy for you to get a hold of us. 

Here are some other great options:

Text

740-590-7311 or 937-382-5545

Email

service@bickleinsurance.com

Website

www.bickleinsurance.com/contact/

 

Have questions? We have answers! Contact us by any of the options above! 

Don’t forget to like and follow us on our social media accounts:

Facebook

Instagram

LinkedIn