Image

It is likely that at this time someone unauthorized (“hacker”) is trying to enter your system or network. Despite having strict cybersecurity strategies in place, criminals can penetrate those defenses and access your sensitive data to steal, use or sell it. They can also encrypt it, or hold it hostage to request financial compensation for its access. Cyberattacks are becoming more sophisticated every day.

At Hub, our professionals are prepared to help you avoid being a victim of cybercrime, identify areas of vulnerability, and provide you with prevention tools. Similarly, we offer a variety of insurance solutions tailored to assist you in the consequences of being harmed in a cyberattack. We have an experienced team available 24/7 to assist you when you need it, including seeking financial support through the appropriate policies.

According to the University of Maryland, 2,244 cyber attacks occur daily in the United States.

Most common types of cyber attacks:

Image

Virus

Software that alters the normal operation of any type of device, from telephones and computers, without the permission or knowledge of the user.

Image

Phishing

A method of tricking a victim into revealing confidential information or allowing the implantation of malicious software on the victim's infrastructure.

Image

AdWare

Software that generates revenue by automatically generating online advertisements in the software's user interface or on a screen presented to the user.

Image

Spyware

Software that collects information about a person or organization and sends it to another entity to harm the user.

Image

Ransomware

Data hijacking via a virus that freezes system functions or seizes valuable information until paid for.

Image

Trojans

Malware that appears as a legitimate and harmless program, but gives remote access to the infected computer.

Image

Malware

A type of virus that collects information for inappropriate use.

Image

Doxing

Publicly disclose personal and private information about an individual or organization, generally over the Internet.

Image

Worms

Malware software that replicates itself to spread to another computer.

WHAT IS A CYBER CRIMINAL LOOKING FOR?

Sensible Data:

  • financial information
  • intellectual property
  • proprietary information
  • account statements
  • databases
  • confidential data
  • passwords
  • transactions
  • formulas
  • vendors
  • operations
  • price lists
  • balance sheets
  • business plans
  • strategies
  • vulnerabilities
In 2020 there were 4.8 million cyberattacks in the United States, reflecting an increase of 45% compared to the previous year.

Request an orientation

Nombre Completo
Email
Phone
Mensaje. Max 150
CAPTCHA

ASK YOURSELF: ARE YOU PREPARED?

 

  1. How many computers, laptops, tablets, and / or cell phones can your system or network be accessed from?
  2. How long would it take to realize that the information was accessed or stolen?
  3. What kind of information do you keep on your system?
  4. What would happen if a "hacker" accesses it? What could he do with it?
  5. How much would it cost you if this happened?

Experts indicate that companies take an average of 7 months to detect a cyber attack. Data from U.S. Small Business Administration indicate that cybercrime costs the global economy about $ 445 billion a year, and the damage to businesses from the theft of intellectual property exceeds $ 160 billion in losses.

Image

MAKE SURE

CYBER INSURANCE OR CYBER POLICY

Are you properly insured for when a cyber attack occurs?

Cyber Insurance can compensate for unexpected financial losses associated with restoring employee and customer identities, recovering compromised data, and repairing damaged computers and networks, either because your company was the victim of a data breach, a password attack. , your data became hostage or an identity substitution attack, or phishing.

This type of insurance is an essential component of a company's risk management strategy plan. It is the policy that will compensate you to be able to assist you in what can represent millionaire losses for the company in hiring experts, legal defense, repairing technology systems, among many possible expenses.

Image
Image

The most common
cover lines include:

  • Security Incidents (“data breaches”)
  • Inadvertent access, use or production of personal information
  • Third party claims
  • Regulatory actions
  • Insured loss or damage coverage (“First Party Coverage”)
  • Ransomware, DDOS, Cybercrime, cyber extortion
  • Business Interruption
  • Forensic investigation
  • “Professional Services E&O”, including technology and Internet services
  • Cyber extortion

Cyber ​​Insurance could cover the following expenses related to the attack:

  • Forensic experts
  • Compliance with state laws
  • Legal guidance
  • Cyber extortion
  • Cost of notifying regulators and individuals impacted by a cybersecurity breach
  • Credit monitoring for impacted individuals
  • Public relations firm for crisis management
  • Regulatory fines
  • Defense Against Legal Claims
Image
Image

At Hub, we have access to various policies that are tailored to the specific needs of each industry and company. We have a group of expert and trained professionals who know the risks posed by cyber incidents and their impact. Our Cyber ​​Insurance team has access to solutions that are better adapted to the requirements and needs of each client

OUR TEAM

Image

Anivette Rodriguez-Rosario, JD

Anivette.Rodriguez@hubinternational.com

Vice President Commercial Lines/ Financial & Specialty

Image

Francisco Pérez-Burgos, Esq.

francisco.perez@hubinternational.com

AIC, CIC, CRM -SVP
Claims and Risk Management

Image

Iris M. Ortega García, Esq.

iris.ortega@hubinternational.com

Manager of Legal Claims and Financial Lines

Image

Paola M. Fuertes Fernández, Esq.

paola.fuertes@hubinternational.com

Assistant Vice President – Specialty Lines
Commercial Lines Department | Financial & Specialty Lines Unit

Image

255 Ave. Ponce de León, Suite 700 San Juan, Puerto Rico 00918 | (787)641-2738 | info@hubinternational.com